BlueKeep Security Vulnerability Escalates to Critical Cyber Threat
BlueKeep exploit escalates to weaponized cyber threat, but Check Point customers remain protected. For more information visit https://blog.checkpoint.com/2019/09/11/bluekeep-exploit-is-weaponized-check-point-customers-remain-protected/
First reported in May 2019, Bluekeep (CVE-2019-070) was reported as a critical security vulnerability by Microsoft. The vulnerability exists in the Remote Desktop Protocol (RDP) and allows for Remote Code Execution (RCE).
While BlueKeep’s devastating potential was known since May 2019, it was a theoretical threat, as there was no working exploit code. That code was released into the wild when the open source Metasploit penetration testing framework released a Bluekeep exploit module on September 6. This module allows to leverage the vulnerability for Remote Code Execution (RCE) based attacks.
With extensive research, we recognized the criticality of this vulnerability and issued both IPS and Endpoint protections immediately following the announcement. Check Point customers who have implemented protections using SandBlast Agent remain protected.
For more information on Check Point’s SandBlast Agent endpoint security protection for BlueKeep, visit https://www.checkpoint.com/products/advanced-endpoint-protection/