On May 12, 2017 a new strain of ransomware impacted a large number of organizations globally.
On June 27,2017 a new strain of ransomware impacted multiple critical organizations globally.
Attack propagates to other computers by exploiting a known SMBv1 remote code execution vulnerability in Microsoft Windows computers.
Please review the following Symantec Connect links and Microsoft for more information pertaining to the attacks detailed above:
Review the Windows Compliance Reports, or Import the attached wannacry Compliance.xml to the ITMS 8.x / 7.6 SMP Console > Reports > All Reports > Software > Patch Management folder highlight the main folder and right-click > Import the saved xml, and review the updates which would apply and cover this vulnerability
Otherwise, patching clients with current Monthly Cumulative Rollups from March 2017 through May 2017 will resolve this issue and cover the vulnerabilities.
Added support for Windows XP & Windows Server 2003 for this Software Update to be deployed in MS17-010 for it was not superseded for these two OS types:
Please subscribe to this article to receive an email notification as this document is updated.
NOTE pertaining to the attached WannaCry Compliance x.x.xml reports.
Additionally, the Compliance by Bulletin (Wanna Cry) w/Reboot Status report is the similar Compliance By Bulletin but will also display the superseded bulletins like MS17-010 which remediate Wannacry / Petya attacks.