BlueKeep Windows Remote Desktop Services RCE Vulnerability
Microsoft has released updates to fix a critical remote code execution (RCE) vulnerability, known as BlueKeep, that affects Remote Desktop Services in some versions of Windows.
Summary
Microsoft has released updates to fix a critical remote code execution (RCE) vulnerability, known as BlueKeep, that affects Remote Desktop Services in some versions of Windows.
Affected platforms
The following platforms are known to be affected:
Threat details
To exploit the vulnerability an attacker would connect to a device using Remote Desktop Protocol (RDP) and send specially crafted requests. This vulnerability could be exploited by a worm as no authentication or user interaction is required.
An attacker who successfully exploited this vulnerability could execute arbitrary code on the affected system; view, change, or delete data; or create new accounts with full user rights.
For further information:
Update
Immunity, a cybersecurity research firm, have announced that the latest version of their CANVAS penetration testing toolkit include a BlueKeep exploitation module. This marks the first time that such a module has been made commercially available.
Threat updates
| Date | Update |
|---|---|
| 25 Jul 2019 |
Immunity, a cybersecurity research firm, have announced that the latest version of their CANVAS penetration testing toolkit include a BlueKeep exploitation module. This marks the first time that such a module has been made commercially available. |
Remediation steps
| Type | Step |
|---|---|
|
Users and administrators are encouraged to review the following Microsoft update advisories and apply the necessary updates. The updates address the vulnerability by correcting how Remote Desktop Services handles connection requests.
Microsoft has provided advice for administrators on alternative mitigation and workarounds. Microsoft recommends that updates are still installed as soon as possible even if any of these steps are taken:
Additionally, administrators can consider the following steps to help prevent and detect attacks using RDP:
Update Microsoft has released additional updates to address an issue with some of the above patches where Internet Explorer 11 and Microsoft Edge could have been prevented from accessing .gov.uk websites that do not support HTTP Strict Transport Security (HSTS). Users and administrators are encouraged to review the following Windows Knowledge Base articles and apply the relevant additional updates:
Update Microsoft has released updated patches via Microsoft Monitoring Agent (MMA) to address the installation issues experienced by some organisations using 3rd party anti-virus products. Users and adminstrators are encouraged to review the following guidance and apply the updates immediately:
Update Microsoft has released further information to address partial installation issues some organisations are experiencing.
They have also recommended restarting the "HealthService" service should the update not apply.
|
CVE Vulnerabilities
Last edited: 14 February 2020 2:44 pm