"This vulnerability is pre-authentication and requires no user interaction. Any future malware that exploits this vulnerability could propagate from vulnerable computer to vulnerable computer in a similar way as the WannaCry malware spread across the globe in 2017," the company wrote in a blog-post on Tuesday.
The company has not yet observed any exploitation of the vulnerability as yet.
However, the security patches have been released to ensure that no cyber attacker could create a malware and attack data and systems saved and running on Windows operating system.
"It is for these reasons that we strongly advise that all affected systems - irrespective of whether Network Level Authentication (NLA) is enabled or not - should be updated as soon as possible," the post added.
Systems running Windows 8 and Windows 10 are not affected by this vulnerability.
(This story has not been edited by Business Standard staff and is auto-generated from a syndicated feed.)