Notice for Genetec Windows-based Appliances: WannaCry Ransomware Attack
May 18, 2017
The following article provides a comprehensive overview of the risks and measures you should take to protect against WannaCry. Please click here to learn more about this ransomware. Microsoft has announced that many users of Windows-based systems might be affected by the malicious WannaCry software. Genetec Security Center software is not affected but we do urge our hardware users to apply relevant Microsoft patches and to review our hardening guides.
On Friday, May 12th, many users of Windows-based systems around the world were affected by malicious "WannaCry" software. Microsoft has provided a detailed overview of this attack which can be read at the following link:
Soon after this attack was launched, Microsoft released a comprehensive series of patches for all Windows users (available here). Over the weekend, the Genetec cybersecurity Response Centre re-tested all variants of our Security Center software and we can confidently say that our software is not affected by either the malicious software or the recommended patches.
That said, we strongly urge all users of Security Center, especially those who use our software on an SV-16, SV-32 or SV-PRO appliance, to immediately apply all relevant patches from Microsoft (available here).
Additionally, we recommend the following procedure for users of Genetec hardware:
|SV Appliances||Potentially Vulnerable, we advise users to immediately download and run the new SV Hardening Tool (available here)|
|AutoVu™ SharpV||Not vulnerable, but we recommend updating to the SharpOS 12.2 SR2, (available here), which provides an additional layer of protection|
|AutoVu SharpX, SharpXS, Sharp 2.0 & 3.0||Vulnerable, we are currently developing a new security patch. Please stay tuned for updates. Concerned clients are encouraged to contact support in order to apply precautionary measures (visit our Technical Assistance Portal here*)|
|Synergis™ Cloud Link||Not vulnerable, no action required|
|Synergis Master Controller (SMC)||Not vulnerable, no action required|
|BCDVideo Appliances||Potentially Vulnerable, we advise users to immediately deploy Microsoft Security Bulletin MS17-010 and update Windows Defender if you have not already done so. see Microsoft recommendations for details|
Finally, Genetec Cloud Services have all been carefully assessed and are not affected by or vulnerable to attacks by the "WannaCrypt" software.
To close, we would remind all users of Genetec products and appliances to review our hardening guides which are available to download from our cybersecurity Response Centre webpage.
*Note: To log into the Genetec Portal, you must be a Security Center user with the appropriate credentials. If you do not have access credentials, please contact [email protected].