<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic BlueKeep exploit is weaponized: Check Point customers remain protected. in Endpoint</title>
    <link>https://community.checkpoint.com/t5/Endpoint/BlueKeep-exploit-is-weaponized-Check-Point-customers-remain/m-p/62224#M3283</link>
    <description>&lt;P&gt;The notorious&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://en.wikipedia.org/wiki/BlueKeep" target="_blank" rel="nofollow noopener noreferrer"&gt;BlueKeep vulnerability&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;has been escalated from a theoretical, critical vulnerability, to an&lt;A href="https://www.forbes.com/sites/daveywinder/2019/09/07/us-government-critical-windows-warning-gets-real-as-wormable-exploit-weaponized/#74f21a207569" target="_blank" rel="nofollow noopener noreferrer"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;immediate, critical threat&lt;/STRONG&gt;&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;While BlueKeep’s devastating potential was always known, it was a theoretical threat, as there was no working exploit code. That code was released into the wild when the open source Metasploit penetration testing framework released a Bluekeep exploit module on September 6. Unfortunately, the Metasploit toolset is used by both security practitioners and cybercriminals alike. By publishing the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://github.com/rapid7/metasploit-framework/pull/12283" target="_blank" rel="nofollow noopener noreferrer"&gt;BlueKeep exploit code&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;hackers were essentially provided with weaponized, working code that enables the creation of a dangerous worm.&lt;/P&gt;
&lt;P&gt;How serious is the threat? If a single unpatched Windows machine with network admin access is running on a network, the attacker may have access to all in-use credentials to all systems on the network, whether they are running Windows, Linux, MacOS or NetBIOS. In effect, this scenario means that a single, infected Windows machine can completely own a network.&lt;/P&gt;
&lt;P&gt;Check Point’s BlueKeep protections for network and endpoint, released several months ago, protect against the new weaponized version of this attack.&lt;/P&gt;
&lt;P&gt;Check Point customers who have implemented these protections remain protected.&lt;/P&gt;
&lt;P&gt;We recommend all customers to take immediate action to make sure they are protected:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Install the Microsoft patch on all vulnerable Windows systems&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?action=portlets.SearchResultMainAction&amp;amp;eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk154732" target="_blank" rel="nofollow noopener noreferrer"&gt;Enable&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Check Point’s IPS network protection for BlueKeep&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk154232" target="_blank" rel="nofollow noopener noreferrer"&gt;Implement&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Check Point’s endpoint protection for BlueKeep&lt;/LI&gt;
&lt;/UL&gt;</description>
    <pubDate>Sun, 08 Sep 2019 18:21:21 GMT</pubDate>
    <dc:creator>Yossi_Hasson</dc:creator>
    <dc:date>2019-09-08T18:21:21Z</dc:date>
    <item>
      <title>BlueKeep exploit is weaponized: Check Point customers remain protected.</title>
      <link>https://community.checkpoint.com/t5/Endpoint/BlueKeep-exploit-is-weaponized-Check-Point-customers-remain/m-p/62224#M3283</link>
      <description>&lt;P&gt;The notorious&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://en.wikipedia.org/wiki/BlueKeep" target="_blank" rel="nofollow noopener noreferrer"&gt;BlueKeep vulnerability&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;has been escalated from a theoretical, critical vulnerability, to an&lt;A href="https://www.forbes.com/sites/daveywinder/2019/09/07/us-government-critical-windows-warning-gets-real-as-wormable-exploit-weaponized/#74f21a207569" target="_blank" rel="nofollow noopener noreferrer"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;immediate, critical threat&lt;/STRONG&gt;&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;While BlueKeep’s devastating potential was always known, it was a theoretical threat, as there was no working exploit code. That code was released into the wild when the open source Metasploit penetration testing framework released a Bluekeep exploit module on September 6. Unfortunately, the Metasploit toolset is used by both security practitioners and cybercriminals alike. By publishing the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://github.com/rapid7/metasploit-framework/pull/12283" target="_blank" rel="nofollow noopener noreferrer"&gt;BlueKeep exploit code&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;hackers were essentially provided with weaponized, working code that enables the creation of a dangerous worm.&lt;/P&gt;
&lt;P&gt;How serious is the threat? If a single unpatched Windows machine with network admin access is running on a network, the attacker may have access to all in-use credentials to all systems on the network, whether they are running Windows, Linux, MacOS or NetBIOS. In effect, this scenario means that a single, infected Windows machine can completely own a network.&lt;/P&gt;
&lt;P&gt;Check Point’s BlueKeep protections for network and endpoint, released several months ago, protect against the new weaponized version of this attack.&lt;/P&gt;
&lt;P&gt;Check Point customers who have implemented these protections remain protected.&lt;/P&gt;
&lt;P&gt;We recommend all customers to take immediate action to make sure they are protected:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Install the Microsoft patch on all vulnerable Windows systems&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?action=portlets.SearchResultMainAction&amp;amp;eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk154732" target="_blank" rel="nofollow noopener noreferrer"&gt;Enable&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Check Point’s IPS network protection for BlueKeep&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk154232" target="_blank" rel="nofollow noopener noreferrer"&gt;Implement&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Check Point’s endpoint protection for BlueKeep&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Sun, 08 Sep 2019 18:21:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/BlueKeep-exploit-is-weaponized-Check-Point-customers-remain/m-p/62224#M3283</guid>
      <dc:creator>Yossi_Hasson</dc:creator>
      <dc:date>2019-09-08T18:21:21Z</dc:date>
    </item>
  </channel>
</rss>

