Metasploit releases BlueKeep exploit, explains it’s for the good

The Rapid7 project Metasploit has finally released an exploit for the BlueKeep flaw disclosed in the May Patch Tuesday update. 

The BlueKeep flaw has prompted warnings from Microsoft and all Five Eye spy agencies to install Microsoft’s patches. 

Microsoft also provided patches for unsupported versions of Windows, fearing the BlueKeep Remote Desktop Protocol (RDP) bug could be as severe as 2017’s WannaCry ransomware outbreak that impacted 300,000 PCs worldwide using the NSA-built EternalBlue exploit. Both flaws could be used by attackers to create a worm that infects one vulnerable machine after another. 

The Australian Signals Directorate (ASD) warned Windows admins in August to “immediately” patch the BlueKeep bug in anticipation of today’s Metasploit release. According to ASD, more than 50,000 devices in Australia were potentially vulnerable in mid-August. 

The RDP bug affects Windows Vista, Windows 7, Windows XP, Server 2003 and Server 2008 operating systems, but not Windows 10.    

After BlueKeep was disclosed Rapid7 detected an spike in malicious RDP scans as attackers probed potentially vulnerable systems. 

That Metasploit is an open source project means the BlueKeep exploit module is now accessible by security defenders and attackers. However, Rapid7 contends its release is a “critical” resource for defenders.      

“Democratic access to attacker capabilities, including exploits, is critical for defenders—particularly those who rely on open-source tooling to understand and effectively mitigate risk,” wrote Brent Cook, a senior manager at Rapid7

“One of the drivers in our releasing the exploit code today as a PR on Metasploit Framework is to enlist the help of the global developer and user community to test, verify, and extend reliability across target environments,” he added. 

Read more: Half of all SMBs cling to Windows 7 despite January 2020 deadline

Several security firms reported having working BlueKeep exploits after Microsoft's May patch, however surprisingly hasn't resulted in mass cyber attacks like WannaCry and NotPetya, which collectively cost firms billions of dollars in damage and downtime

Although the BlueKeep exploit could assist attackers, Cook notes that the exploit doesn’t yet allow for automatic targeting of different systems, so there are still some obstacles to using it for widespread attacks. But that limitation is likely to be overcome in future as improved BlueKeep modules emerge.

In its current state, users of the exploit module need to correctly define the target in order to compromise the system or else the target Windows system will simply crash with a blue screen of death (BSOD).

“Users should also note that some elements of the exploit require knowledge of how Windows kernel memory is laid out, which varies depending on both OS version and the underlying host platform (virtual or physical); the user currently needs to specify this correctly to run the exploit successfully,” explained Cook. 

Read more: Microsoft warns: get off Windows 10 1703, no patches after October 9

“Server versions of Windows also require a non-default configuration for successful exploitation—namely, changing a registry setting to enable audio sharing. This limitation may be removed in the future.”

BlueKeep isn’t the only threat stemming from RDP vulnerabilities. After conducting an audit in the wake of BlueKeep’s disclosure, Microsoft researchers discovered four more BlueKeep-like flaws -- aka DeJaBlue -- that affected all versions of Windows 10 as well as Windows 7 SP1, Windows Server 2008 R2 SP1, Windows Server 2012, Windows 8.1, Windows Server 2012 R2. And that means it's likely to be a source of new threats in future.

 “The protocol’s inherent complexity suggests that the known bugs today will not be the last, particularly since exploit developers and researchers now have a more nuanced understanding of RDP and its weaknesses. Continued exploitation is likely, as is increased exploit sophistication,” noted Cook. 

Echoing Microsoft’s advice, Rapid7 encourages all Windows admins that ave RDP in their environment to enable Network Level Authentication and tighten up network access controls to mitigate future RDP vulnerabilities like BlueKeep.  

Read more: BlueKeep-like wormable flaws hit Windows 10: Microsoft urges immediate patch

 

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Follow our new CSO Australia LinkedIn
Follow our new social and we'll keep you in the loop for exclusive events and all things security!
CSO WANTED
Have an opinion on security? Want to have your articles published on CSO? Please contact CSO Content Manager for our guidelines.

Tags Microsoftwindows xpmetasploitRapid7Windows 10BlueKeep

More about AustraliaMicrosoftNSARapid7

Show Comments

Featured Whitepapers

Editor's Recommendations

Brand Page

Stories by Liam Tung

Latest Videos

More videos

Blog Posts