Metasploit releases BlueKeep exploit code (CVE-2019-0708)
- Windows 2003
- Windows XP
- Windows 7
- Windows 2008
BlueKeep is a exploit that was patched back i July 2019. The security flaw, discovered in Windows Remote Desktop Protocol (RDP), enables unauthenticated attackers to run code remotely, to launch denial of service attacks, and, in some cases, to take full control of unpatched systems. Metasploit is a widely known penetration testing toolkit. They have now released exploit code to the public for the vulnerability. If you haven’t patched for it, now is certainly the time.
What is BlueKeep?
BlueKeep is a exploit that was first discovered by the UK National Cyber Security Center on 14 may 2019. The vulnerable code existed in Microsoft Operating systems ranging from Windows 2000 to Windows 7. It exploits the RDP service and allows the attacker to run code directly on the system. The vulnerability was patched on the 14th may 2019 by Microsoft. Previously it has not been reported that a exploit was in the public domain. It has however been reported at exploit code has been commercially available.
What is Metasploit?
Metasploit is a Pentesting toolkit that was first released back in 2003. The framework is used to actively test vulnerabilities of the target systems and it exists in a Open Source version and a commercial version. The Opensouce version is installed as default in Kali Pentesting Toolkit. The widely popular, because it easy to use for everyone.
The basic steps for exploiting a system using the Framework include:
- Choosing and configuring an exploit (code that enters a target system by taking advantage of one of its bugs; about 900 different exploits for Windows, Unix/Linux and Mac OS X systems are included);
- Optionally checking whether the intended target system is susceptible to the chosen exploit;
- Choosing and configuring a payload (code that will be executed on the target system upon successful entry; for instance, a remote shell or a VNC server);
- Choosing the encoding technique so that hexadecimal opcodes known as “bad characters” are removed from the payload, these characters will cause the exploit to fail.
- Executing the exploit.
All the steps can be done via CLI or a GUI.
Why is this so dangerous now?
Before 31. July, security researchers haven’t seen this exploit being used in the wild. There have however been some rumors of commercial available exploit code for sale. On the 6. of September, Metasploit released a public free version of the exploit. This now means that anyone can use the exploit to gain access to the vulnerable systems. It is still being reported that 1/5 of all servers that are on line are still vulnerable to the exploit. We urge all our customers and partners to keep their servers updated, especially the public facing servers.
- Apply latest patches for the vulnerability.
The information provided herein is on “as is” basis, without warranty of any kind.