{"id":6020,"date":"2025-12-01T16:31:04","date_gmt":"2025-12-01T16:31:04","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=6020"},"modified":"2025-12-01T16:31:04","modified_gmt":"2025-12-01T16:31:04","slug":"microsoft-gives-windows-admins-a-legacy-migration-headache-with-wins-sunset","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=6020","title":{"rendered":"Microsoft gives Windows admins a legacy migration headache with WINS sunset"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>Microsoft has given system administrators until 2034 to stop using WINS (Windows Internet Name Service) NetBIOS name resolution technology in their networks \u2014 but even nine years may not be enough notice for some: WINS is very much still in use, supporting a niche range of difficult-to-replace legacy systems.<\/p>\n<p><a href=\"https:\/\/learn.microsoft.com\/windows-server\/networking\/technologies\/wins\/wins-top\">WINS<\/a> dates from Windows NT in 1994 and has long since been displaced by the more modern Domain Name System (DNS). It was deprecated in 2021 to coincide with the appearance of Windows Server 2022. This meant it would be supported but no longer developed, a clear signal that the clock was ticking.<\/p>\n<p>Now, Microsoft has said, the last operating system to support WINS will be Windows Server 2025. That\u2019s what determines the nine-year final migration deadline \u2014 the lifespan of Windows Server 2025 on the Long-Term Servicing Channel (LTSC).<\/p>\n<p>\u201cOrganizations using WINS are strongly encouraged to migrate to modern DNS-based name resolution solutions,\u201d the company said, perhaps stating the obvious, in a <a href=\"https:\/\/support.microsoft.com\/en-gb\/topic\/wins-removal-moving-forward-with-modern-name-resolution-f00381f0-7237-4f7b-8e78-aa6f9c5b279f\">Windows Message Center advisory<\/a> in early November.<\/p>\n<p>According to Microsoft, the timescale is generous. \u201cOur goal is to make planning and migrations as predictable and low-stress as possible. With advanced notice and a support runway, organizations can confidently modernize their environments at their own pace,\u201d it said.<\/p>\n<h2 class=\"wp-block-heading\">Cutting out WINS<\/h2>\n<p>Future versions of Windows without support for WINS will lose the WINS Server role and associated binaries, the WINS Microsoft Management Console (MMC) snap-in, and WINS automation APIs and related management interfaces, the company added.<\/p>\n<p>WINS migration is yet another legacy issue inherited from the creative ferment of computer networking in the 1980s and 1990s. That era needed solutions to lots of networking problems in a hurry, especially how to turn a desktop PC operating system such as DOS or Windows into a practical server platform.<\/p>\n<p>WINS solved an important challenge: how to connect the names used to identify computers using the 1980s\u2019 NetBIOS network naming system with modern IP addresses. DNS, a hierarchical system that worked for Internet as well as network addresses, had rendered NetBIOS obsolete. But both ended up co-existing, examples of how the industry delivered more than one answer to the same problem.<\/p>\n<p>Today, the arguments for getting rid of WINS extend beyond its obsolescence. It is also a security risk. In 2017, Fortinet\u2019s <a href=\"https:\/\/www.fortinet.com\/blog\/threat-research\/wins-server-remote-memory-corruption-vulnerability-in-microsoft-windows-server\">FortiGuard Labs discovered<\/a> a WINS Server remote memory corruption vulnerability in Windows Server 2008, 2012, and 2016.<\/p>\n<p>Microsoft\u2019s reply to Fortinet made interesting reading: \u201cA fix would require a complete overhaul of the code to be considered comprehensive. The functionality provided by WINS was replaced by DNS and Microsoft has advised customers to migrate away from it.\u201d<\/p>\n<p>In short, Microsoft had no plans to patch the issue. Its solution was that customers migrate away from WINS, a process it has since become clear could still be ongoing for some customers into the 2030s.<\/p>\n<h2 class=\"wp-block-heading\">Why WINS is still in use<\/h2>\n<p>Organizations still using WINS are likely to fall into one of two categories: those using it to support old technologies with long lifecycles such as operational technology (OT) systems, and those that have simply half-forgotten that they are still using it.<\/p>\n<p>\u201cFor OT stacks built around WINS\/NetBIOS, replacing them isn\u2019t trivial because changing name resolution touches safety\u2011critical systems and bespoke integrations,\u201d said <a href=\"https:\/\/www.linkedin.com\/in\/kieranbuk\/\">Kieran Bhardwaj<\/a>, head of security engineering at UK cyber security consultancy Bridewell, which specializes in advising on critical infrastructure.<\/p>\n<p>\u201cLegacy technologies persist because some niche systems like industrial\/OT environments are engineered for multi\u2011decade lifecycles. Many control systems are architecturally fixed and can\u2019t be re\u2011platformed,\u201d he said. \u201cIt\u2019s also hard for Microsoft: WINS sits deep in the networking stack which means removing a once\u2011core component demands exhaustive regression to avoid unintended breakage.\u201d<\/p>\n<p>Equally, according to <a href=\"https:\/\/www.linkedin.com\/in\/william-wright-chcsp-2054a72a\/?originalSubdomain=uk\">William Wright<\/a> of pen-testing company Closed Door Security, WINS was still running on some networks for the same reason that many legacy technologies overstay their usefulness: migration apathy.<\/p>\n<p>\u201cMost organizations running WINS today probably aren\u2019t actively using it for anything critical. They\u2019ve just never had a compelling reason to turn it off,\u201d he said. \u201cIt\u2019s been quietly replicating in the background, consuming minimal resources, causing no obvious problems. That\u2019s the nature of legacy infrastructure: It persists not because it\u2019s needed, but because removing it requires effort and carries risk, while leaving it alone is free,\u201d said Wright.<\/p>\n<h2 class=\"wp-block-heading\">WINS is a security risk<\/h2>\n<p>WINS had major design limitations that made it a security risk, said Wright. \u201cWINS has no mechanism to verify the legitimacy of name registrations, which makes it vulnerable to spoofing attacks,\u201d said Wright.<\/p>\n<p>\u201cAn attacker on the network can register malicious entries, including Web Proxy Auto-Discovery (WPAD) records to intercept web traffic, or redirect connections to systems they control. It\u2019s a straightforward path for lateral movement,\u201d he said.<\/p>\n<p>Finding WINS still turned on inside a network was a godsend to hackers using open-source tools such as <a href=\"https:\/\/github.com\/SpiderLabs\/Responder\">Responder<\/a> to conduct name resolution <a href=\"https:\/\/www.resecurity.com\/es\/blog\/article\/from-broadcast-to-breach-llmnrnbt-ns-poisoning-in-action\">poisoning attacks<\/a> against legacy Windows protocols such as Link-Local Multicast Name Resolution (LLMNR) and the NetBIOS Name Service (NBT-NS), Wright added.<\/p>\n<p>Worse, the presence of WINS often indicated that a target was using other vulnerable legacy protocols. \u201cSystems often fall back to NetBIOS broadcast queries when WINS isn\u2019t available, which are spoofable on local networks. This is exactly what tools like Responder exploit, and it remains a common technique in penetration testing and real-world attacks alike.\u201d<\/p>\n<h2 class=\"wp-block-heading\">Network inventory<\/h2>\n<p>Organizations looking to rip WINS out should start with an inventory to find out where it is being used, Bhardwaj said: \u201cMany organizations don\u2019t realize a legacy asset still relies on WINS, so proactively inventory older segments and OT\/ICS networks and verify resolution paths before the next upgrade window.\u201d<\/p>\n<p>\u201cThe trade-off is that customers still using WINS must put in the work to move to DNS by auditing dependencies, modernizing or isolating legacy workloads, and implementing DNS. But the payoff is a simpler, more secure platform.<\/p>\n<p>In the end, even the brightest and best-performing technologies will one day be legacy. Migrating from WINS is a test of how well organizations are dealing with this wider problem. \u201cThere\u2019s way too much legacy that is unused and that presents an attack surface for no reason,\u201d said Bhardwaj.<\/p>\n<p>This article first appeared on <a href=\"https:\/\/www.computerworld.com\/article\/4098085\/microsoft-gives-windows-admins-a-legacy-migration-headache-with-wins-sunset.html\">Computerworld<\/a>.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Microsoft has given system administrators until 2034 to stop using WINS (Windows Internet Name Service) NetBIOS name resolution technology in their networks \u2014 but even nine years may not be enough notice for some: WINS is very much still in use, supporting a niche range of difficult-to-replace legacy systems. WINS dates from Windows NT in [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":6021,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-6020","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/6020"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6020"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/6020\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/6021"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6020"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6020"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6020"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}