The ongoing government shutdown could leave desktop and server systems in many federal agencies vulnerable to new threats disclosed Tuesday by Microsoft in its latest round of security updates.
Many federal agencies are operating with skeletal IT staff. All IT systems deemed non-essential have been shut down, making the installation of Microsoft's latest patches, especially on desktop and notebook systems, very difficult for federal agencies, say security analysts.
[ InfoWorld presents the Bossies 2013, the best open source software for security, data centers, clouds, and more. | Keep up with key security issues with InfoWorld's Security Adviser blog and Security Central newsletter. ]
"The October Windows critical vulnerabilities go across PC and server operating systems," said John Pescatore, director of emerging technologies at the SANS Institute.
"While most of the government security staff was deemed essential, it is likely that many of the employee PCs and laptops were turned off, so it will be hard to patch them," Pescatore noted. So, when the standoff is over and government workers return, a lot of their PCs could be missing critical patches.
Microsoft yesterday issued patches for 26 flaws, including several critical, remotely exploitable, flaws in Windows XP, Windows Server 2003, the Microsoft .Net Framework and multiple versions of the Internet Explorer browser. The patches part of the company's regular monthly security updates.
Security analysts typically recommend that organizations implement Microsoft's security patches as soon as possible to mitigate the risk from hackers.
Over the years, Microsoft and several vendors have released tools that make it much easier for organizations to quickly test and to install required patches with minimal service disruptions.
Theoretically, there should be fewer problems with server updates due to the shutdown -- most agencies have far fewer servers than client systems.
"You would think that without users they could actually patch servers faster," Pescatore said. "However, the reality of these shutdowns is that informal processes get disrupted even if the essential people are still there."
Richard Stiennon, principal at security consulting firm IT-Harvest, predicts that many government systems will have problems once they are turned on after the shutdown. "Best practice would be to isolate these machines until they can be brought up to the most recent patch level," Stiennon noted.
"I suspect that most agencies do not have best practice patch management where they deploy patches quickly anyway," he said.
Though most systems are idle during the shutdown, Stiennon suggested that "because so much attention being paid to the numerous websites displaying shutdown notices, agency IT staffs should be on heightened alert for defacement, DDoS (distributed denial of service) attacks and other shenanigans during the crisis."