Congress

Warner wants updates on feds' software patching

 

Sen. Mark Warner is worried that federal agencies and contractors may be vulnerable to the global WannaCry ransomware contagion.

As the WannaCry ransomware hack wreaks havoc worldwide, one senator wants to make sure federal agencies are protected.

Sen. Mark Warner (D-Va.) is worried that federal networks could be vulnerable to malware such as WannaCry, which has been linked to an exploit developed by the National Security Agency.

"Both within the federal government and across critical infrastructure sectors, IT security has too often been either, at best, addressed as an afterthought in the product development cycle or, worse, simply neglected," Warner wrote in a May 15 letter to Homeland Security Secretary John Kelly and Office of Management and Budget Director Mick Mulvaney.

In a May 15 White House press briefing, National Security Advisor H.R. McMaster said that "as of today, no federal systems are affected."

At DHS, Kelly is leading public-private coordination efforts, McMaster said, and is "holding multiple calls per day in operational centers managing our response."

The WannaCry malware spreads from machine to machine without any assistance from users. Unpatched Windows machines are highly vulnerable. New variants of the contagion are reportedly being made by hackers who obtained the exploit via the Shadow Brokers leak in April. The first wave of attacks has been slowed by taking advantage of a "kill switch" inside the malware. New variants have been observed without the kill-switch function, although according to Kaspersky Labs, these have yet to propagate widely.

Warner is concerned about unpatched endpoints on federal networks.

"Patch management is a complex undertaking, particularly for large organizations and enterprises," Warner wrote. "Large organizations, including federal agencies, often do not know what insecure endpoints (and associated software) may be operating on their networks."

Warner wants information on the steps being taken by agencies to implement relevant Microsoft security updates, as well as details on how the government ensures contractors’ systems that connect to federal computers are patched as required by the Federal Information Security Management Act. Warner is also seeking details on patches to federal IT systems that are using out-of-support software like Windows XP and other retired systems.

Microsoft released patches for retired systems to guard against the WannaCry exploit.

According to a March 2017 White House report, 90 percent of agencies are hitting federal CIO targets for vulnerability management. The numbers are up for 2016 over 2015, largely thanks to the cyber sprint initiative that followed the hack of the Office of Personnel Management.

However, an agency-by-agency breakout for the last quarter of FY2016 shows that many large agencies, including the departments of State, Commerce, Energy, Transportation and Interior, were operating with vulnerability management levels far below the federal target of 95 percent.

The official reporting doesn't take into account unauthorized devices, or "shadow IT," operating on federal networks -- a problem noted by Warner in his letter.

"Needless to say, ensuring that all of an agency's information systems implement up-to-date security updates is made infeasible if an agency does not have an accurate inventory of endpoints connected to its network," Warner wrote.

So far, McMaster said in his briefing, "the U.S. infection rate has been lower than many parts of the world, but we may still see a significant impact on additional networks as these malware attacks morph and change."

McMaster also urged vigilance on patching.

"While it would be satisfying to hold accountable those responsible for the attack, something that we are working on quite seriously, the worm is in the wild, so to speak, at this point, and patching is the most important message, as a result," he said.  "Our business and government have responded with upgrades and patches, defensive mitigations, and this has dramatically reduced the vulnerable population over the last three days.  But this needs to continue to be our focus."

About the Author

Adam Mazmanian is executive editor of FCW.

Before joining the editing team, Mazmanian was an FCW staff writer covering Congress, government-wide technology policy and the Department of Veterans Affairs. Prior to joining FCW, Mazmanian was technology correspondent for National Journal and served in a variety of editorial roles at B2B news service SmartBrief. Mazmanian has contributed reviews and articles to the Washington Post, the Washington City Paper, Newsday, New York Press, Architect Magazine and other publications.

Click here for previous articles by Mazmanian. Connect with him on Twitter at @thisismaz.


Featured

  • Telecommunications
    Stock photo ID: 658810513 By asharkyu

    GSA extends EIS deadline to 2023

    Agencies are getting up to three more years on existing telecom contracts before having to shift to the $50 billion Enterprise Infrastructure Solutions vehicle.

  • Workforce
    Shutterstock image ID: 569172169 By Zenzen

    OMB looks to retrain feds to fill cyber needs

    The federal government is taking steps to fill high-demand, skills-gap positions in tech by retraining employees already working within agencies without a cyber or IT background.

  • Acquisition
    GSA Headquarters (Photo by Rena Schild/Shutterstock)

    GSA to consolidate multiple award schedules

    The General Services Administration plans to consolidate dozens of its buying schedules across product areas including IT and services to reduce duplication.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.