The BlueKeep RDP vulnerability (CVE-2019-0708) is a remote code execution flaw that affects approximately one million systems (as at 29 May 2019) running older versions of Microsoft operating systems. Attention shifted to BlueKeep about two weeks ago, during Microsoft's May 2019 Patch Tuesday. Microsoft released patches but their warning that the vulnerability is wormable drew the attention of security researchers who have uncovered more concerning findings about this emerging cyber threat.
That means it's similar to the EternalBlue exploit that was used in ransomware attacks such as WannaCry and NotPetya. Wormable attacks are especially dangerous as they can spread automatically on unprotected systems.
Vulnerabilities that affect older systems are a double whammy for cybersecurity risk. Systems running on old operating systems are typically not well maintained by the vendor (in this case, Microsoft), or by the end user, because they're usually running legacy applications. For example Windows XP is affected, which is out of support. It is of serious concern that Microsoft felt that BlueKeep was significant enough to warrant the first Patch Tuesday release for XP in five years.
The risk of a remote code execution vulnerability in Remote Desktop Services (RDS) is that it can be exploited by attackers, by connecting to the targeted system via the RDP (Remote Desktop Protocol) and running arbitrary code on the system. Given that RDS/RDP is involved, a proportion of the ~1 million exposed targets are likely to be high value targets such as jump boxes which are an entry point into a more valuable network.
Reports are in that a number of threat actors are executing port scans to detect the BlueKeep vulnerability on Windows systems. These actors have been detected hiding behind dozens of TOR exit nodes, indicating that the a wave of BlueKeep-related cyber attacks could be next. Thankfully, security researchers have not yet published any proof-of-concept exploit code for BlueKeep. However, several companies have publicly disclosed that they've successfully developed exploit code for BlueKeep, which they intend to keep private. The list includes McAfee, Kaspersky, Check Point and MalwareTech.
It's never been easier to find exposed hosts. Tools such as Masscan and Zmap can be used to scan the entire Internet in minutes, making it trivial for attackers to find vulnerable systems. The author of Masscan, Robert Graham of Errata Security has already published an open source scanner for BlueKeep on GitHub.
The BlueKeep vulnerability affects older versions of Microsoft Windows, including:
Newer versions of Windows, such as Windows 10 and Windows 8 are considered safe at this stage.
Organizations that use UpGuard are able to instantly pinpoint any vulnerable machines on their network, and help answer key questions that de-risk this emerging threat:
If your organization is looking for help with the BlueKeep RDP vulnerability, UpGuard can pinpoint and manage this threat before an attack.