BlueKeep Security Vulnerability Escalates to Critical Cyber Threat

Subscribers:
79,900
Published on ● Video Link: https://www.youtube.com/watch?v=ZL8hgLlWaME



Duration: 1:49
1,105 views
19


BlueKeep exploit escalates to weaponized cyber threat, but Check Point customers remain protected. For more information visit https://blog.checkpoint.com/2019/09/11/bluekeep-exploit-is-weaponized-check-point-customers-remain-protected/

First reported in May 2019, Bluekeep (CVE-2019-070) was reported as a critical security vulnerability by Microsoft. The vulnerability exists in the Remote Desktop Protocol (RDP) and allows for Remote Code Execution (RCE).

While BlueKeep’s devastating potential was known since May 2019, it was a theoretical threat, as there was no working exploit code. That code was released into the wild when the open source Metasploit penetration testing framework released a Bluekeep exploit module on September 6. This module allows to leverage the vulnerability for Remote Code Execution (RCE) based attacks.

With extensive research, we recognized the criticality of this vulnerability and issued both IPS and Endpoint protections immediately following the announcement. Check Point customers who have implemented protections using SandBlast Agent remain protected.

For more information on Check Point’s SandBlast Agent endpoint security protection for BlueKeep, visit https://www.checkpoint.com/products/advanced-endpoint-protection/




Other Videos By Check Point Software


2019-10-08IT Security Is About Trust, Availability, and Bottom-Line Results
2019-10-04Cloud Network Security for AWS Cloud Environments | Check Point CloudGuard IaaS
2019-09-30CheckMates “Ask Us Anything” with Check Point CEO Gil Shwed and VP of Products Dr. Dorit Dor | Pt. 2
2019-09-23Avianca Airlines Takes Off to the Cloud Securely with Check Point
2019-09-20CheckMates “Ask Us Anything” with Check Point CEO Gil Shwed and VP of Products Dr. Dorit Dor | Pt. 1
2019-09-18Desert Research Institute Elevates Data Security With Check Point R80 and SandBlast Network
2019-09-18How to Transform Your Branch Office Connectivity Through Cloud-Delivered Security Services
2019-09-17Protecting Branch Offices with Cloud-Delivered Security | Check Point's CloudGuard Connect
2019-09-11Stefanini Prevents Zero-Day Attacks with Check Point R80.10 Solutions
2019-09-11Webinar | How Application Security Provider, Veracode, Boosted Cloud Visibility and Compliance
2019-09-11BlueKeep Security Vulnerability Escalates to Critical Cyber Threat
2019-09-06Welcome to the Future of Cyber Security | Check Point Software
2019-09-05Using Client Provisioning to Intercept a Victim's Mobile Traffic
2019-09-03Check Point CloudGuard IaaS - Transit Gateway Inbound ASG | Part 3/3
2019-09-03Check Point CloudGuard IaaS - Transit Gateway Inbound ASG | Part 2/3
2019-09-03Check Point CloudGuard IaaS - Transit Gateway Inbound ASG | Part 1/3
2019-09-03Check Point CloudGuard IaaS - Transit Gateway Outbound ASG
2019-09-03Check Point CloudGuard IaaS - Setting up the AWS Transit Gateway
2019-09-03Check Point CloudGuard IaaS - Management Server Advanced Configuration
2019-09-03Check Point CloudGuard IaaS - Install Management Server
2019-09-03Check Point CloudGuard Network Security - AWS Transit Gateway Introduction



Tags:
BlueKeep exploit
BlueKeep Vulnerability
Critical Cyber Threat
Check Point
open source Metasploit
SandBlast Agent
Check Point SandBlast Agent
Remote Code Execution
Endpoint protections
cyber security
cyber security research
endpoint protection
ips protection
critical security threat
security vulnerability
Microsoft's Remote Desktop Protocol