{"id":16255,"date":"2019-09-06T12:30:04","date_gmt":"2019-09-06T20:30:04","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/09\/06\/news-9997\/"},"modified":"2019-09-06T12:30:04","modified_gmt":"2019-09-06T20:30:04","slug":"news-9997","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/09\/06\/news-9997\/","title":{"rendered":"Heads up: A free, working exploit for BlueKeep just hit"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security7-100734736-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Fri, 06 Sep 2019 11:33:00 -0700<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">There\u2019s been a lot of discussion about BlueKeep, its ramifications and various strategies for blocking it. In a nutshell, it\u2019s a security hole in the Windows Remote Desktop Protocol that allows a malicious program to enter your machine \u2013 if you have Remote Dekstop turned on, it\u2019s accessible directly from the internet, and you haven\u2019t installed the May patches.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Two weeks ago, Susan Bradley posted <\/span><a href=\"https:\/\/www.csoonline.com\/article\/3432960\/how-to-avoid-using-rdp-on-windows.html\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">a CSO article<\/span><\/a><span style=\"font-weight: 400;\"> that details ways admins can \u00a0avoid using RDP. I\u2019ve seen reams of advice about blocking ports, disabling services, setting authentication levels, deploying voodoo dolls, reading chicken entrails\u2026, but the simplest way for almost everybody to avoid the problem is to <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3400237\/its-time-to-install-the-may-windows-and-office-patches.html\"><span style=\"font-weight: 400;\">install the May<\/span><\/a><span style=\"font-weight: 400;\"> (or later) Windows patches.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Earlier today, Kevin Beaumont \u2013 who I consider to be a world-class authority on the subject \u2013 posted <\/span><a href=\"https:\/\/twitter.com\/GossiTheDog\/status\/1170014744176148481\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">this warning<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The first public, free #BlueKeep exploit is out in Metasploit now.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">He, in turn, points to this article by <\/span><a href=\"https:\/\/blog.rapid7.com\/2019\/09\/06\/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Brent Cook on the Rapid7 site<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By default, Metasploit\u2019s BlueKeep exploit only identifies the target operating system version and whether the target is likely to be vulnerable. The exploit does not currently support automatic targeting; it requires the user to manually specify target details before it will attempt further exploitation. If the module is interrupted during exploitation, or if the incorrect target is specified, the target will crash with a bluescreen. Users should also note that some elements of the exploit require knowledge of how Windows kernel memory is laid out, which varies depending on both OS version and the underlying host platform (virtual or physical); the user currently needs to specify this correctly to run the exploit successfully. Server versions of Windows also require a non-default configuration for successful exploitation\u2014namely, changing a registry setting to enable audio sharing. This limitation may be removed in the future.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So the next worm isn\u2019t yet a massive threat \u2013 but you can bet that it will be. Soon.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Get the May (or later) Windows patches applied. Now.<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Thx @NetDef<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">More <\/span><\/i><a href=\"https:\/\/www.askwoody.com\/2019\/heads-up-theres-a-working-free-but-stunted-bluekeep-exploit-making-the-rounds\/\" rel=\"nofollow noopener\" target=\"_blank\"><i><span style=\"font-weight: 400;\">on AskWoody<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">.<\/span><\/i><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3436857\/heads-up-a-free-working-exploit-for-bluekeep-just-hit.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security7-100734736-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Fri, 06 Sep 2019 11:33:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p><span style=\"font-weight: 400;\">There\u2019s been a lot of discussion about BlueKeep, its ramifications and various strategies for blocking it. In a nutshell, it\u2019s a security hole in the Windows Remote Desktop Protocol that allows a malicious program to enter your machine \u2013 if you have Remote Dekstop turned on, it\u2019s accessible directly from the internet, and you haven\u2019t installed the May patches.<\/span><\/p>\n<aside class=\"fakesidebar\"><strong>[ Related: <a href=\"https:\/\/www.csoonline.com\/article\/3267893\/security\/microsoft-windows-10-vs-apple-macos-18-security-features-compared.html\">Microsoft Windows 10 vs. Apple macOS: 18 security features compared<\/a> ]<\/strong><\/aside>\n<p><span style=\"font-weight: 400;\">Two weeks ago, Susan Bradley posted <\/span><a href=\"https:\/\/www.csoonline.com\/article\/3432960\/how-to-avoid-using-rdp-on-windows.html\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">a CSO article<\/span><\/a><span style=\"font-weight: 400;\"> that details ways admins can \u00a0avoid using RDP. I\u2019ve seen reams of advice about blocking ports, disabling services, setting authentication levels, deploying voodoo dolls, reading chicken entrails\u2026, but the simplest way for almost everybody to avoid the problem is to <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3400237\/its-time-to-install-the-may-windows-and-office-patches.html\"><span style=\"font-weight: 400;\">install the May<\/span><\/a><span style=\"font-weight: 400;\"> (or later) Windows patches.<\/span><\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3436857\/heads-up-a-free-working-exploit-for-bluekeep-just-hit.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[13764,714,10525],"class_list":["post-16255","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-pcs","tag-security","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16255","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16255"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16255\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16255"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16255"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16255"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}