Bluekeep Critical vulnerability on RDP Protocol Port 3389

Bluekeep Critical vulnerability on RDP Protocol Port 3389

Microsoft released a critical patch for an RDP vulnerability called Bluekeep. This video presents a technical overview of the vulnerability.

Bluekeep

During Microsoft’s May Patch Tuesday cycle, a security advisory was released for a vulnerability in the Remote Desktop Protocol (RDP). What was unique in this particular patch cycle was that Microsoft produced a fix for Windows XP and several other operating systems, which have not been supported for security updates in years. So why the urgency and what made Microsoft decide that this was a high risk and critical patch?

Critical Vulnerability

According to the advisory, the issue discovered was serious enough that it led to Remote Code Execution exploit and was wormable, meaning it could spread automatically on unprotected systems. The bulletin referenced well-known network worm “WannaCry” which was heavily exploited just a couple of months after Microsoft released MS17-010 as a patch for the related vulnerability in March 2017.

McAfee Advanced Threat Research has been analyzing this latest bug to help prevent a similar scenario and we are urging those with unpatched and affected systems to apply the patch for CVE-2019-0708 as soon as possible.

It is extremely likely malicious actors have weaponized this bug and exploitation attempts will likely be observed in the wild in the very near future.

Protect against BlueKeep Vulnerability

https://www.microsoft.com/security/blog/2019/08/08/protect-against-bluekeep/

Ultimate Guide How to Secure SSH Server | Update 2020

Leave a Reply