They should definitely be closed by default. But they might have been opened to facilitate any SMB usage, which is of course possible but I cannot believe that the rules would be so lax as to not filter for specific IP addresses for the port access. That's just asking for something like this to happen. Most system admins are of the belief that it'd never happen to them though. Honestly, if that's how this has happened, people in charge of the infrastructure need to be held accountable. I've done some reading on the ransomware and I cannot imagine it will have been able to spread the way that it has without the firewall ports being vulnerable in the first instance.
Years ago there was a similar issue with the Windows Messaging service, which had ports open by default in every router. Fortunately the extent of this was simply annoying pop up messages that you'd get in Windows. Then there was the Sasser worm which affected lsass.exe which also behaved in a similar manner. This reminds me of having to deal with those back in the day!
500,000 currently open according to this chap:
What I cannot get over is 7 years ago.
https://isc.sans.edu/forums/diary/Cyber+Security+Awareness+Month+Day+1+Port+445+SMB+over+TCP/7210/