Worms Exploit Plug and Play Vulnerabilities

In 2003, the blaster worm infected as many as 10 million computers just three weeks after Microsoft Corp. issued a patch for the hole the worm exploited. Today, IT administrators would love to have even a week to patch their systems before a worm appears to exploit a new flaw. A mob of malicious programs […]

Written By: Paul F. Roberts
Aug 21, 2005
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

In 2003, the blaster worm infected as many as 10 million computers just three weeks after Microsoft Corp. issued a patch for the hole the worm exploited.

Today, IT administrators would love to have even a week to patch their systems before a worm appears to exploit a new flaw.

A mob of malicious programs knocked down networks across the country last week, using a powerful, remote exploit of the Windows Plug and Play service that appeared just a day after Microsoft issued a patch for the hole Aug. 9.

The fast-closing window to patch vulnerable systems is putting pressure on IT departments everywhere to find better ways to distribute patches.

But some experts warn that worm and bot outbreaks distract attention from a deeper and darker problem: undiscovered or undisclosed vulnerabilities in software running on critical systems.

By late last week, there were 19 worms that exploit the Plug and Play flaw, including new worm families such as Zotob and Dogbot and variants of Rbot, officials for security vendor Sophos plc. said.

Read more here about Zotob and PnP worms slamming 13 DaimlerChrysler plants.

The flood of malicious programs, coming so soon after the Microsoft patch, made it hard for IT staff members at many companies to patch vulnerable systems in time.

The worms knocked 13 of DaimlerChrysler AG’s U.S. manufacturing plants offline for as long as 50 minutes on Tuesday, idling as many as 50,000 workers, said spokesperson Dave Elshoff in Detroit.

Customer support workers at SBC Communications Inc. also were idled as variants of the recent Zotob and Rbot worms raced through the company’s computer network last week, causing Windows 2000 systems to reboot and hampering the ability of staff to assist customers, said spokesperson Wes Warnick in San Antonio.

SBC was still evaluating the Microsoft patch when the worms hit, Warnick said.

“A large enterprise like SBC has to do testing to make sure that those patches are compatible with existing systems,” he said.

Zotob proves that patch management isn’t enough. Click here to read more.

Microsoft and others recommend a “defense in depth” approach for customers that includes a desktop firewall, anti-virus software, intrusion detection technology and patch management tools, said Stephen Toulouse, security program manager at Microsoft’s Security Response Center, in Redmond, Wash.

A combination of those technologies kept Windows 2000 systems at Principal Financial Group from being hit with Zotob or its cousins, said Corey Null, who works in the information services group at Principal, in Des Moines, Iowa.

The company usually requires a lot of time to test patches, but the company makes an exception for high-risk threats such as the Plug and Play flaw, Null said.

But some experts warn that worm and malicious-code outbreaks can be somewhat of a smoke screen.

“Whatever Microsoft reports is only the tip of the iceberg,” said Nand Mulchandani, vice president of business development and founder of Determina Inc., a security vendor based in Redwood City, Calif. “In most of the [hacking] underground, if somebody finds a vulnerability, they’ll use it, not write a worm for it.”

Window of vulnerability

  • Aug. 9 Microsoft releases patch for vulnerability in Windows Plug and Play service
  • Aug. 10 Security experts warn of potential for a worm
  • Aug. 11 Exploit code appears
  • Aug. 14 Zotob, a worm and backdoor Trojan, appears
  • Aug. 15 Reports surface of companies and universities hit with the worm; new bots and worms using the Plug and Play hole, such as IRCbot, SDbot and Dogbot
  • Aug. 16 Reports of widespread disruptions caused by the Plug and Play worms at CNN, ABC, The New York Times, SBC and others

    Check out eWEEK.com’s for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzer’s Weblog.

  • Recommended for you...

    Backblaze CEO on GTM Strategy & AI Demand on M&E Datasets

    Backblaze CEO on record growth, AI and M&E wins, and how new products and partnerships are driving enterprise cloud storage adoption.

    Jordan Smith
    Aug 13, 2025
    MetTel to Modernize Communication Lines for VA

    MetTel secures a $54M contract to modernize 15,000 VA phone lines across 1,875 locations using its POTS Transformation solution, enhancing reliability and performance.

    Jordan Smith
    Aug 8, 2025
    Stibo Systems Launches New AI Capabilities Across Portfolio

    Stibo Systems unveils AI-driven MDM tools to reduce manual work, boost data accuracy, and accelerate operations for global enterprises and partners.

    Jordan Smith
    Aug 7, 2025
    Galactic Advisors Wins Credential-Free Assessment Patent

    Galactic Advisors patents a user-activated, credential-free pen testing tool, boosting MSP security with risk-free, forensic-grade assessments.

    Jordan Smith
    Aug 6, 2025
    Channel Insider Logo

    Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

    Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

    Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.