WannaCry Ransomware Attack and Wyse Thin Clients

WannaCry Ransomware Attack and Wyse Thin Clients




Overview

In May of 2017 the WannaCry/WannaCrypt ransomware targeted certain Windows operating systems, encrypted valuable information on a respective computer and then forced the user to pay a fee, or "ransom", to access it.

Microsoft has released security patches for the following Windows versions: WES7, WES7P, WE8S 64-bit, WES8S 32-bit, Windows 10 IoT Enterprise 2016 (Redstone), Windows 10 IoT Enterprise 2015 (Threshold), XPE and WES2009. Regardless of whether you are utilizing Dell thin clients or an infrastructure protected by Dell ESSE or Threat Defense, we strongly urge customers to download and install the patch for the added security benefits it provides.

Affected platforms Link for patch (click to download)
Wyse 3030 Thin Client with WES7 Link for WES7 patch
Wyse 5010 Thin Client with WES7 and WE8S Link for WES7, WE8S patch
Wyse 5020 Thin Client with WES7, WES7P and WE8S Link for WES7, WES7P and WE8S patch
Wyse 5020 Thin Client with Win 10 IoT Enterprise Link for Win 10 IoT Enterprise patch
Wyse 5060 Thin Client with WES7P Link for WES7P patch
Wyse 5060 Thin Client with WES7P and Win 10 IOT Enterprise license Link for WES7P and Win 10 IOT Enterprise license patch
Wyse 7010 Thin Client with WES7 and WES8 Link for WES7 and WE8S patch
Wyse 7010 Extended Chassis Thin Client with WES7 Link for WES7 patch
Wyse 7020 Thin Client with WES7, WES7P and WE8S Link for WES7, WES7P and WE8S patch
Wyse 7020 Thin Client with Win10 IoT Enterprise Link for Win 10 IoT Enterprise patch
Wyse 7020 accelerated graphics Thin Client with WES7P and Windows 10 IoT Enterprise Link for WES7P and Windows 10 IoT Enterprise patch
Wyse 7040 Thin Client with WES7P and Win 10 IoT Enterprise license Link for WES7P and Win 10 IOT Enterprise patch
Latitude 3460 Mobile Thin Client with WES7P Link for WES7P patch
Latitude E7270 mobile thin client with WES7P Link for WES7P patch
Note: All new Windows units will require the patch.

What to do if a Windows Thin Client is infected?

When a Windows based thin client is infected, simply reboot the system and the infection will be removed. If a user has been using the thin client with the write filter turned off, then they should simply re-image the thin client.

How to install security patch?

Installation procedure from Wyse Device Manager (WDM)
  1. Download the .exe file from the following path:
    https://appservices.wyse.com/pages/serviceandsupport/support/downloads.asp.
  2. Copy the .exe file to WDM server and extract .exe file, by default it will extract packages to "C:\WDM packages" folder.
  3. Right-click on Other Packages from Package Manager in WDM server UI.
  4. Select New -> Package and click Next.
  5. Select Register a Package from script file (.rsp) and click Next.
  6. Browse & choose corresponding .rsp file(extracted in above point 2) and prepare the package.
  7. Schedule the package to the target client.
Installation procedure from CCM
  1. Extract the .exe downloaded from the following path:
    https://appservices.wyse.com/pages/serviceandsupport/support/downloads.asp
  2. Copy the .msu file present from the extracted folder to On-Premise gateway server.
  3. Navigate to Apps&data  App Policies  Thin Client from the CCM console.
  4. Select the file which was copied in step 2.
  5. Select Edit policy.
  6. Select the Mandatory option for the group where the file need to be deployed (Devices present in the group will get the policy).
  7. Wait till the job completed successfully.
  8. Now the package would have been deployed at the devices.
Installation procedure from SCCM
  1. Extract the .exe downloaded from the following path:
    https://appservices.wyse.com/pages/serviceandsupport/support/downloads.asp
  2. Copy the .msu file present from the extracted folder to SCCM server.
  3. Follow the standard SCCM app deployment procedure to install this package.

Resources

Security patch for Microsoft vulnerability

To access Wyse firmware and patch downloads, visit Wyse Support Downloads and select your Windows Embedded device from the drop down list.

Blogs and more information from Microsoft about the ransomware



Article ID: SLN306538

Last Date Modified: 07/24/2018 02:38 PM


Rate this article

Accurate
Useful
Easy to understand
Was this article helpful?
Yes No
Send us feedback
Comments cannot contain these special characters: <>()\
Sorry, our feedback system is currently down. Please try again later.

Thank you for your feedback.