Remember that Remote Desktop ServicesÂ vulnerabilityÂ from May this year (2019)? … well, now BlueKeep has an active exploit!
It’s not new!
In May 2019, Microsoft twice warned users to implement a new security patch to address a vulnerabilityÂ inÂ itsÂ RemoteÂ DesktopÂ Services (CVE-2019-0708).Â With a CVSS score of 9.8, this vulnerability affects un-patched versions of the following operating systems:
- Windows XP
- Windows Vista
- Windows 7
- Windows Server 2003
- Windows Server 2008
- Windows Server 2008 R2
Further emphasising the severity of this vulnerability, Microsoft has also released patches for the unsupported Windows XP and Windows Server 2003 operating systems
This vulnerability does not require authentication or user interaction. In other words, the vulnerability is exploitable by unauthenticated users, services, or systems, and is subsequently â€˜wormableâ€™, meaning that any future malware that exploits this vulnerability could propagate from vulnerable computer to vulnerable computer in a similar way as the WannaCry ransomware attack.
As reported on Forbes.com on the 3rd November 2019, this vulnerability is being ACTIVELY EXPLOITED.
If ever you had a reason …
If ever you had a reason to patch, this is it. Â In May, it was theory – we knew that there was a risk, we knew how to fix it, but the exploit wasn’t “in the wild”. Â Well, it is now.
So pretty please. Â Patch your Systems !
This post was originally authored on thisÂ blog,Â you can also see the corresponding LinkedIn Article here -Â https://www.linkedin.com/pulse/bluekeep-exploit-andrew-barnes