Given the scope and publicity of this attack, it's difficult to explain to my managers why my recommended vendor has not responded better, and gotten this out. We are moving forward with a custom patch...
It does appear that an update has been released
Shavlik has released updated patch XML files for Shavlik Protect.
XML 220.127.116.117 Last Modified 05/13/2017
- Updated MS17-010(Q4012598): Added patches for Windows 8, Windows XP and Windows Server 2003
I'd like to apologize that you haven't received a response on this issue. It is our off business hours so the community is not manned as it is during the week.
The MS17-010 update for all other OS families other than Vista and Server 2008 Standard were released previously as part of the March's security bundle update. Our content team has put out a special XML to add detection for other OS's that didn't move to the security bundle patching. The below bulletin ID's are from March's Security bundle update that contain the exploit fix.
SB17-002: Security only bundle for Windows 7 and Server 2008 R2.
SB17-003: Security only bundle for Windows 8.1 and Server 2012 R2.
SB17-004: Security only bundle for Server 2012 Standard.
CSWU-048: Cumulative Service Update for Windows 10 and Server 2016.
Since we have the patches already included in our XML data, there is no need to deploy a custom patch since we have already provided the detection and deployment support for the above mentioned patches.
If you have any concerns, please submit a case to us on Monday during our normal operation hours.