Microsoft warns again (for the second time) its customers for vulnerability BlueKeep or CVE-2019-0708. Let us recall that the specific security gap it exists in older versions of Windows and in the Remote Desktop Protocol (RDP) service.
The company issued the second warning because they appeared in the last two days online, exploits with two different PoCs (for example)
"Microsoft is confident that there is an exploit for this issue, and if recent reports are accurate, nearly one million online computers are still vulnerable to CVE-2019-0708", said Simon Pope, Director of Incident Response, at the Microsoft Security Response Center (MSRC).
Scans for computers that are vulnerable to BlueKeep continue for a week and are reported to have an ever-increasing rate of vulnerable systems. Microsoft, after the emergence of public PoC warns again before the attacks begin.
The updates που επιδιορθώνουν το θέμα είναι διαθέσιμες για όλα τα παλειότερα λειτουργικά την Microsoft (Windows XP, Windows Vista, Windows 7, Windows Server 2003 and Windows Server 2008) all versions of Windows that are vulnerable to BlueKeep attacks.
The company had warned for the first time in 14 May when it released the updates that fixed the issue. Then the company had said that the flaw was dangerous because it not only allowed remote execution but also because it was a worm (it has the ability to replicate).
"Our recommendation remains the same. We recommend that you update all affected systems as soon as possible," reports Simon Pope.
Here is to say that the PoC we give above through GitHub is not as dangerous as it can hit a remote vulnerable system, but it can not run code on it.
However, experienced reverse engineers were able to achieve remote code execution but did not publish a PoC in the face of a massive infection.
Security researchers who have managed to create a functional exploit are from companies Zerodium, McAfee, Kaspersky, Check Pointst, MalwareTechAnd Valthek.