CERT.be recommends administrators to update their Windows with the latest available patches. They can be found here:
Advisories
17/04/2019
Advisory
15/04/2019
Advisory
Upgrade to Nagios XI 5.5.11 or above.
Upgrade Nagios IM component to version 2.2.7 or above.
03/04/2019
Advisory
CERT.be recommends administrators to update their Apache version to the latest available version.
28/03/2019
Advisory
- Run the ASUS diagnostic utility to determine whether your system has been affected.
22/02/2019
Advisory
CERT.be recommends administrators to update their BIND version.
- Both BIND 9.11.5-P4 and BIND 9.11.5-P4 include a fix for the memory leak.
- If patching is not possible immediately, there are no other known mitigations.
22/02/2019
Advisory
CERT.be recommends administrator to update their Drupal version.
29/01/2019
Advisory
CERT.be recommends users to follow the following steps to mitigate this attack as a patch is not yet available:
24/01/2019
Advisory
The PEAR Team is actually rebuilding a ‘clean’ version of their website. Meanwhile it’s still possible to clone their GitHub repository, checking the tag of the release you want, cd and install.
CERT.be recommends to apply the Windows patches as soon as you can.