Feds respond to critical Windows flaw

Shutterstock image of a line of faulty code.

Microsoft's latest weekly security bulletin released Feb. 10 contained patch instructions to fix a critical vulnerability affecting versions of the Windows operating systems. An attacker could exploit the flaw to gain user access to affected systems, including administrative access, depending on how the attack is directed. Users become vulnerable by connecting over unknown networks, like a coffee-shop Wi-Fi connection.

Known as "JASBUG," the flaw requires the implementation of a complex set of patches that go beyond the download-and-restart installation.

"This is not just a configuration issue in the code, this is an actual problem in the code," White House cybersecurity advisor Michael Daniel said at a meeting of the Information Security and Privacy Advisory Board of the National Institute for Standards and Technology. "You can't just implement the patch. You can break things if you do it incorrectly."

The Office of Management and Budget and the Department of Homeland Security are collaborating on implementing the fix across federal networks.

"The more challenging feature of this is sort of rolling this out across all federal agencies, getting them to implement it, and do that in a way that doesn't break anything significant as we're doing it. We've got a good schedule laid out and OMB and DHS have been doing a good job about that," Daniel said.

The National Cybersecurity and Communications Integration Center is addressing the problem at DHS. The U.S. Computer Emergency Readiness Team released an alert about the vulnerability.

"We are working with other agencies across the executive branch and critical infrastructure entities to determine any potential risk and to implement mitigation strategies as necessary," DHS spokesman S.Y. Lee said.

"I think that we learned a lot from our experience going through Heartbleed, and we got a little bit better with Bash, and I think that in this case we were able to get our act together in time so that we were ready for the patch when it actually rolled out," Daniel said. "In some ways this is a good news story on the government side. We actually did learn something from previous vulnerabilities and adjusted our processes to get a little bit ahead of it."

About the Author

Adam Mazmanian is executive editor of FCW.

Before joining the editing team, Mazmanian was an FCW staff writer covering Congress, government-wide technology policy and the Department of Veterans Affairs. Prior to joining FCW, Mazmanian was technology correspondent for National Journal and served in a variety of editorial roles at B2B news service SmartBrief. Mazmanian has contributed reviews and articles to the Washington Post, the Washington City Paper, Newsday, New York Press, Architect Magazine and other publications.

Click here for previous articles by Mazmanian. Connect with him on Twitter at @thisismaz.


  • IT Modernization
    Eisenhower Executive Office Building (Image: Wikimedia Commons)

    OMB's user guide to the MGT Act

    The Office of Management and Budget is working on a rules-of-the-road document to cover how agencies can seek and use funds under the MGT Act.

  • global network (Pushish Images/

    As others see us -- a few surprises

    A recent dinner with civil servants from Asia delivered some interesting insights, Steve Kelman writes.

  • FCW Perspectives
    cloud (Singkham/

    A smarter approach to cloud

    Advances in cloud technology are shifting the focus toward choosing the right tool for the job and crafting solutions that truly modernize systems.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.