Info
To ensure that Windows Server-Based infrastructure has been patched to resist Microsoft Server Message Block 1.0 (SMBv1) server malware attack vectors, such as the recent “WannaCry” ransomware attack, HPE has created a consolidated and easy to access list of Microsoft resources and SMB 1.0 patch download links.
HPE strongly recommends to keep the Windows Server deployments up-to-date, staying abreast of the latest security and maintenance updates that are regularly available through Windows Update.
Refer to the Microsoft Security Bulletin MS17-010
for additional information:
Issue description:
https://technet.microsoft.com/en-us/library/security/ms17-010.aspx
List of patches addressing the issue described in MS17-010:
https://blogs.technet.microsoft.com/sudheesn/2017/05/17/patches-that-fix-the-vulnerability-for-ms17-010/
Stand-Alone patch:
Windows Server 2003 (incl. patches for Windows Server 2003 x86/32bit and Windows Server 2003 x64)
Windows Server 2008 (x86, x64, and Itanium-based systems)
http://www.catalog.update.microsoft.com/search.aspx?q=kb4012598
Any HPE ProLiant servers compatible with any Microsoft Windows Server Operating System could be affected. For a complete list refer to:
www.hpe.com/servers/wincert
Microsoft Windows Server 2016
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2012
Microsoft Windows Server 2008 R2
Note
: One or more of the links above will take you outside the Hewlett Packard Enterprise web site. HPE does not control and is not responsible for information outside of the HPE web site.