Feds respond to critical Windows flaw

Shutterstock image of a line of faulty code.

Microsoft's latest weekly security bulletin released Feb. 10 contained patch instructions to fix a critical vulnerability affecting versions of the Windows operating systems. An attacker could exploit the flaw to gain user access to affected systems, including administrative access, depending on how the attack is directed. Users become vulnerable by connecting over unknown networks, like a coffee-shop Wi-Fi connection.

Known as "JASBUG," the flaw requires the implementation of a complex set of patches that go beyond the download-and-restart installation.

"This is not just a configuration issue in the code, this is an actual problem in the code," White House cybersecurity advisor Michael Daniel said at a meeting of the Information Security and Privacy Advisory Board of the National Institute for Standards and Technology. "You can't just implement the patch. You can break things if you do it incorrectly."

The Office of Management and Budget and the Department of Homeland Security are collaborating on implementing the fix across federal networks.

"The more challenging feature of this is sort of rolling this out across all federal agencies, getting them to implement it, and do that in a way that doesn't break anything significant as we're doing it. We've got a good schedule laid out and OMB and DHS have been doing a good job about that," Daniel said.

The National Cybersecurity and Communications Integration Center is addressing the problem at DHS. The U.S. Computer Emergency Readiness Team released an alert about the vulnerability.

"We are working with other agencies across the executive branch and critical infrastructure entities to determine any potential risk and to implement mitigation strategies as necessary," DHS spokesman S.Y. Lee said.

"I think that we learned a lot from our experience going through Heartbleed, and we got a little bit better with Bash, and I think that in this case we were able to get our act together in time so that we were ready for the patch when it actually rolled out," Daniel said. "In some ways this is a good news story on the government side. We actually did learn something from previous vulnerabilities and adjusted our processes to get a little bit ahead of it."

About the Author

Adam Mazmanian is executive editor of FCW.

Before joining the editing team, Mazmanian was an FCW staff writer covering Congress, government-wide technology policy and the Department of Veterans Affairs. Prior to joining FCW, Mazmanian was technology correspondent for National Journal and served in a variety of editorial roles at B2B news service SmartBrief. Mazmanian has contributed reviews and articles to the Washington Post, the Washington City Paper, Newsday, New York Press, Architect Magazine and other publications.

Click here for previous articles by Mazmanian. Connect with him on Twitter at @thisismaz.


  • IT Modernization
    shutterstock image By enzozo; photo ID: 319763930

    OMB provides key guidance for TMF proposals amid surge in submissions

    Deputy Federal CIO Maria Roat details what makes for a winning Technology Modernization Fund proposal as agencies continue to submit major IT projects for potential funding.

  • gears and money (zaozaa19/

    Worries from a Democrat about the Biden administration and federal procurement

    Steve Kelman is concerned that the push for more spending with small disadvantaged businesses will detract from the goal of getting the best deal for agencies and taxpayers.

Stay Connected