While intelligence agencies and Microsoft are shifting each other's responsibility for an unprecedented wave of WannaCry attacks, IB experts in their turn blame the hapless system administrators who did not update their systems on time. However, the spread of the infection could be facilitated not only by products directly from Microsoft. For example, Cisco began testing its products for vulnerabilities that allow malicious software to attack its customers' systems.
Experts of the Cisco Product Security Incident Response Team (PSIRT) are involved in identifying vulnerable products that do not support either manual or automatic installation of updates that would prevent the WannaCry extortion. In other words, researchers compile a list of products to be destroyed, since the vulnerability in them can not be corrected in any way.
According to Cisco's announcement, there are currently no other ways to fix the vulnerability except to install Microsoft's security bulletin MS17-010 or disable SMBv1 (if possible).
Whether other Windows device manufacturers are investigating their products for a non-patchable vulnerability, it is not known.
WannaCry (also known as WCry, WannaCrypt and WanaCrypt0r 2. 0) - malware, network worm and extortion program, which struck on May 12, 2017 hundreds of thousands of computers running Windows. It is distributed with the help of a modified exploit supposedly from the arsenal of the US National Security Agency EternalBlue, intended for vulnerability in SMBv1.