Patch BlueKeep now Australian spy agency warns Windows admins

The Australian Signals Directorate (ASD) is warning Windows admins to “immediately” patch the BlueKeep bug after a researcher handed an exploit for it to developers of the Metasploit Project. 

The agency is urging Australian organizations to patch now in anticipation of the Metasploit Project including an exploit for BlueKeep becoming available in the popular the open source penetration-testing kit, the Metasploit Framework. 

A security researcher who uses the Twitter handle @zerosum0x0 disclosed the exploit to the MetaSploit Project in late July, however the group has said it would keep the code private for now. The project recently released a module for using BlueKeep to create a denial of service attack, but not remote code execution.   

“The disclosure, once made available to the public, is anticipated to increase the amount of RDP scanning actively, increasing the chances of attempted exploitation of unpatched systems,” ASD’s  Australian Cyber Security Centre (ACSC) said in a statement

The agency said it was aware of malicious activity suggesting widespread abuse of BlueKeep, also identified as CVE-2019-0708, a flaw that can allow a remote attacker to attack systems listening for RDP on the internet and steal an organization’s credentials. 

BlueKeep affects Windows Vista, Windows 7, Windows XP, Server 2003 and Server 2008 operating systems, but not Windows 10. 

It’s the ASD’s second warning to Australian organizations after a reminder in June that BlueKeep was serious enough a threat for Microsoft to release patches for unsupported Windows, such as Vista and Windows XP. UK and US spy agencies have also raised alarms over the flaw.   

ACSC head Rachel Nobel estimated as many as 50,000 devices within Australian organizations could be affected. 

Microsoft released the patch for BlueKeep in its May Patch Tuesday update as well as special updates for unsupported systems because Microsoft believes this wormable bug -- meaning it can spread from machine to machine -- has the potential to become a repeat of the WannaCry outbreak in May 2017.  

The ACSC’s new warning follows one from Microsoft last Thursday. First and foremost, the company recommends applying the patch but also offers secondary mitigation advice, in particular network level authentication (NLA), which requires users authenticate before connecting to remote systems. 

“It’s important to note that the exploit code is now publicly and widely available to everyone, including malicious actors,” Microsoft wrote. "By exploiting a vulnerable RDP system, attackers will also have access to all user credentials used on the RDP system.”


Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Follow our new CSO Australia LinkedIn
Follow our new social and we'll keep you in the loop for exclusive events and all things security!
CSO WANTED
Have an opinion on security? Want to have your articles published on CSO? Please contact CSO Content Manager for our guidelines.

Tags MicrosoftpatchWindowsAustralian Signals DirectorateACSCBlueKeep

More about MicrosoftTwitter

Show Comments

Featured Whitepapers

Editor's Recommendations

Brand Page

Stories by Liam Tung

Latest Videos

More videos

Blog Posts