<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic [Breaking News] SandBlast Agent Protects Against BlueKeep RDP Vulnerability (CVE-2019-0708)! in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Breaking-News-SandBlast-Agent-Protects-Against-BlueKeep-RDP/m-p/54498#M10887</link>
    <description>&lt;P&gt;&lt;STRONG&gt;Critical Vulnerability in Windows OS - Code execution using Remote Desktop Protocol (CVE-2019-0708)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="text-align: center;"&gt;&lt;FONT size="5" color="#000000"&gt;&lt;STRONG&gt;SandBlast Agent is the First Endpoint Security Solution to &lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P style="text-align: center;"&gt;&lt;FONT size="5" color="#000000"&gt;&lt;STRONG&gt;Protect Against BlueKeep RDP Vulnerability!&amp;nbsp;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="StyleHeaderGray-80" style="margin-left: .15in;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="StyleHeaderGray-80" style="margin-left: .15in;"&gt;&lt;SPAN style="font-weight: normal;"&gt;&lt;FONT color="#000000"&gt;Recently, a security advisory was released for a vulnerability in RDP (Remote Desktop Protocol) affecting multiple Windows Operating Systems prior to 8.1. According to Microsoft’s advisory&lt;/FONT&gt; &lt;/SPAN&gt;&lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708" target="_blank" rel="noopener"&gt;&lt;SPAN style="color: blue; font-weight: normal;"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN style="color: windowtext; font-weight: normal;"&gt;, &lt;FONT color="#000000"&gt;this vulnerability can be exploited for both remote code execution and denial of service attacks. All this without needing the credentials of the target machine.&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="StyleHeaderGray-80" style="margin-left: .15in;"&gt;&lt;FONT color="#000000"&gt;&lt;SPAN style="color: windowtext; font-weight: normal;"&gt;Check Point’s SandBlast Agent Anti-Exploit now monitors the RDP service for both Windows 7 and Windows 2008R2 and is able to prevent this attack from occurring. Not only ןד SandBlast Agent able to prevent the exploit from being delivered on unpatched systems, but it is also able to prevent the exploit from being delivered to the previously vulnerable driver in patched systems.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="StyleHeaderGray-80" style="margin-left: .15in;"&gt;&lt;FONT color="#000000"&gt;The protection is available in SandBlast Agent's E80.97 Client Version (Can be downloaded from&amp;nbsp;&lt;/FONT&gt;&lt;SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk154432&amp;amp;partition=General&amp;amp;product=Endpoint" target="_blank" rel="noopener"&gt;sk154432&lt;/A&gt;&lt;FONT color="#000000"&gt;).&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="StyleHeaderGray-80" style="margin-left: 0.15in;"&gt;&lt;FONT color="#000000"&gt;&lt;SPAN style="color: windowtext; font-weight: normal;"&gt;To see Anti-Exploit’s protection in action please see the following video, where our Threat Research Group’s POC used for exploitation is blocked. In addition, you can also see how we are able to block the scan of the Metasploit module that was recently developed to identify vulnerable systems.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="StyleHeaderGray-80" style="margin-left: .15in;"&gt;&lt;FONT color="#000000"&gt;&lt;U&gt;&lt;STRONG&gt;&lt;SPAN style="color: windowtext;"&gt;Video 1: SandBast Agent protects against Check Point's Threat Research group BlueKeep based exploit:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;div class="lia-vid-container video-embed-center"&gt;&lt;div id="lia-vid-Z2eDh2aDE6pF4E1utWADPTjNmElHTa-gw1600h900r220" class="lia-video-brightcove-player-container"&gt;&lt;video-js data-video-id="6065295769001" data-account="6058022097001" data-player="default" data-embed="default" class="vjs-fluid" controls="" data-application-id="" style="width: 100%; height: 100%;"&gt;&lt;/video-js&gt;&lt;/div&gt;&lt;script src="https://players.brightcove.net/6058022097001/default_default/index.min.js"&gt;&lt;/script&gt;&lt;script&gt;(function() {  var wrapper = document.getElementById('lia-vid-Z2eDh2aDE6pF4E1utWADPTjNmElHTa-gw1600h900r220');  var videoEl = wrapper ? wrapper.querySelector('video-js') : null;  if (videoEl) {     if (window.videojs) {       window.videojs(videoEl).ready(function() {         this.on('loadedmetadata', function() {           this.el().querySelectorAll('.vjs-load-progress div[data-start]').forEach(function(bar) {             bar.setAttribute('role', 'presentation');             bar.setAttribute('aria-hidden', 'true');           });         });       });     }  }})();&lt;/script&gt;&lt;a class="video-embed-link" href="https://community.checkpoint.com/t5/video/gallerypage/video-id/Z2eDh2aDE6pF4E1utWADPTjNmElHTa-g"&gt;(view in My Videos)&lt;/a&gt;&lt;/div&gt;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Video 2:&amp;nbsp;&lt;SPAN style="color: windowtext;"&gt;SandBast Agent protects against &lt;SPAN style="color: windowtext;"&gt;Metasploit module developed to identify vulnerable systems&lt;/SPAN&gt;:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;U&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;&lt;SPAN style="color: windowtext;"&gt;&lt;div class="lia-vid-container video-embed-center"&gt;&lt;div id="lia-vid-MzeDh2aDE6R1dvzwvOykbzEjcw1TRfTBw1600h900r172" class="lia-video-brightcove-player-container"&gt;&lt;video-js data-video-id="6065277746001" data-account="6058022097001" data-player="default" data-embed="default" class="vjs-fluid" controls="" data-application-id="" style="width: 100%; height: 100%;"&gt;&lt;/video-js&gt;&lt;/div&gt;&lt;script src="https://players.brightcove.net/6058022097001/default_default/index.min.js"&gt;&lt;/script&gt;&lt;script&gt;(function() {  var wrapper = document.getElementById('lia-vid-MzeDh2aDE6R1dvzwvOykbzEjcw1TRfTBw1600h900r172');  var videoEl = wrapper ? wrapper.querySelector('video-js') : null;  if (videoEl) {     if (window.videojs) {       window.videojs(videoEl).ready(function() {         this.on('loadedmetadata', function() {           this.el().querySelectorAll('.vjs-load-progress div[data-start]').forEach(function(bar) {             bar.setAttribute('role', 'presentation');             bar.setAttribute('aria-hidden', 'true');           });         });       });     }  }})();&lt;/script&gt;&lt;a class="video-embed-link" href="https://community.checkpoint.com/t5/video/gallerypage/video-id/MzeDh2aDE6R1dvzwvOykbzEjcw1TRfTB"&gt;(view in My Videos)&lt;/a&gt;&lt;/div&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;&lt;SPAN style="color: windowtext;"&gt;SandBlast Agent BlueKeep Event Forensics Report:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;&lt;SPAN style="color: windowtext;"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="BK.jpg" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/1374iAE731A99E43BC111/image-size/large?v=v2&amp;amp;px=999" role="button" title="BK.jpg" alt="BK.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;H6&gt;To learn more about SandBlast Agent's Anti-Exploit protection of BlueKeep, see:&amp;nbsp;&lt;SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk154232" target="_blank" rel="noopener"&gt;sk154232 - Anti-Exploit Protection for Remote Desktop Protocol Vulnerability (CVE-2019-0708)&lt;/A&gt;&lt;/SPAN&gt;&lt;/H6&gt;
&lt;H6&gt;Note: Users who run SandBlast Agent with a third party Anti-Virus (AV) should be aware that Anti-Exploit is turned off in the presence of third party AVs. For this protection to be enabled, you must allow Anti-Exploit to work with third party AVs as detailed in &lt;SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk154454" target="_blank" rel="noopener"&gt;sk154454 - Enabling Anti-Exploit when deployed with a third party Anti-Virus.&lt;/A&gt;&lt;/SPAN&gt;&lt;/H6&gt;</description>
    <pubDate>Tue, 28 May 2019 12:16:21 GMT</pubDate>
    <dc:creator>Yossi_Hasson</dc:creator>
    <dc:date>2019-05-28T12:16:21Z</dc:date>
    <item>
      <title>[Breaking News] SandBlast Agent Protects Against BlueKeep RDP Vulnerability (CVE-2019-0708)!</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Breaking-News-SandBlast-Agent-Protects-Against-BlueKeep-RDP/m-p/54498#M10887</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Critical Vulnerability in Windows OS - Code execution using Remote Desktop Protocol (CVE-2019-0708)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="text-align: center;"&gt;&lt;FONT size="5" color="#000000"&gt;&lt;STRONG&gt;SandBlast Agent is the First Endpoint Security Solution to &lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P style="text-align: center;"&gt;&lt;FONT size="5" color="#000000"&gt;&lt;STRONG&gt;Protect Against BlueKeep RDP Vulnerability!&amp;nbsp;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="StyleHeaderGray-80" style="margin-left: .15in;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="StyleHeaderGray-80" style="margin-left: .15in;"&gt;&lt;SPAN style="font-weight: normal;"&gt;&lt;FONT color="#000000"&gt;Recently, a security advisory was released for a vulnerability in RDP (Remote Desktop Protocol) affecting multiple Windows Operating Systems prior to 8.1. According to Microsoft’s advisory&lt;/FONT&gt; &lt;/SPAN&gt;&lt;A href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708" target="_blank" rel="noopener"&gt;&lt;SPAN style="color: blue; font-weight: normal;"&gt;https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN style="color: windowtext; font-weight: normal;"&gt;, &lt;FONT color="#000000"&gt;this vulnerability can be exploited for both remote code execution and denial of service attacks. All this without needing the credentials of the target machine.&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="StyleHeaderGray-80" style="margin-left: .15in;"&gt;&lt;FONT color="#000000"&gt;&lt;SPAN style="color: windowtext; font-weight: normal;"&gt;Check Point’s SandBlast Agent Anti-Exploit now monitors the RDP service for both Windows 7 and Windows 2008R2 and is able to prevent this attack from occurring. Not only ןד SandBlast Agent able to prevent the exploit from being delivered on unpatched systems, but it is also able to prevent the exploit from being delivered to the previously vulnerable driver in patched systems.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="StyleHeaderGray-80" style="margin-left: .15in;"&gt;&lt;FONT color="#000000"&gt;The protection is available in SandBlast Agent's E80.97 Client Version (Can be downloaded from&amp;nbsp;&lt;/FONT&gt;&lt;SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk154432&amp;amp;partition=General&amp;amp;product=Endpoint" target="_blank" rel="noopener"&gt;sk154432&lt;/A&gt;&lt;FONT color="#000000"&gt;).&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="StyleHeaderGray-80" style="margin-left: 0.15in;"&gt;&lt;FONT color="#000000"&gt;&lt;SPAN style="color: windowtext; font-weight: normal;"&gt;To see Anti-Exploit’s protection in action please see the following video, where our Threat Research Group’s POC used for exploitation is blocked. In addition, you can also see how we are able to block the scan of the Metasploit module that was recently developed to identify vulnerable systems.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="StyleHeaderGray-80" style="margin-left: .15in;"&gt;&lt;FONT color="#000000"&gt;&lt;U&gt;&lt;STRONG&gt;&lt;SPAN style="color: windowtext;"&gt;Video 1: SandBast Agent protects against Check Point's Threat Research group BlueKeep based exploit:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;div class="lia-vid-container video-embed-center"&gt;&lt;div id="lia-vid-Z2eDh2aDE6pF4E1utWADPTjNmElHTa-gw1600h900r717" class="lia-video-brightcove-player-container"&gt;&lt;video-js data-video-id="6065295769001" data-account="6058022097001" data-player="default" data-embed="default" class="vjs-fluid" controls="" data-application-id="" style="width: 100%; height: 100%;"&gt;&lt;/video-js&gt;&lt;/div&gt;&lt;script src="https://players.brightcove.net/6058022097001/default_default/index.min.js"&gt;&lt;/script&gt;&lt;script&gt;(function() {  var wrapper = document.getElementById('lia-vid-Z2eDh2aDE6pF4E1utWADPTjNmElHTa-gw1600h900r717');  var videoEl = wrapper ? wrapper.querySelector('video-js') : null;  if (videoEl) {     if (window.videojs) {       window.videojs(videoEl).ready(function() {         this.on('loadedmetadata', function() {           this.el().querySelectorAll('.vjs-load-progress div[data-start]').forEach(function(bar) {             bar.setAttribute('role', 'presentation');             bar.setAttribute('aria-hidden', 'true');           });         });       });     }  }})();&lt;/script&gt;&lt;a class="video-embed-link" href="https://community.checkpoint.com/t5/video/gallerypage/video-id/Z2eDh2aDE6pF4E1utWADPTjNmElHTa-g"&gt;(view in My Videos)&lt;/a&gt;&lt;/div&gt;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Video 2:&amp;nbsp;&lt;SPAN style="color: windowtext;"&gt;SandBast Agent protects against &lt;SPAN style="color: windowtext;"&gt;Metasploit module developed to identify vulnerable systems&lt;/SPAN&gt;:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;U&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;&lt;SPAN style="color: windowtext;"&gt;&lt;div class="lia-vid-container video-embed-center"&gt;&lt;div id="lia-vid-MzeDh2aDE6R1dvzwvOykbzEjcw1TRfTBw1600h900r829" class="lia-video-brightcove-player-container"&gt;&lt;video-js data-video-id="6065277746001" data-account="6058022097001" data-player="default" data-embed="default" class="vjs-fluid" controls="" data-application-id="" style="width: 100%; height: 100%;"&gt;&lt;/video-js&gt;&lt;/div&gt;&lt;script src="https://players.brightcove.net/6058022097001/default_default/index.min.js"&gt;&lt;/script&gt;&lt;script&gt;(function() {  var wrapper = document.getElementById('lia-vid-MzeDh2aDE6R1dvzwvOykbzEjcw1TRfTBw1600h900r829');  var videoEl = wrapper ? wrapper.querySelector('video-js') : null;  if (videoEl) {     if (window.videojs) {       window.videojs(videoEl).ready(function() {         this.on('loadedmetadata', function() {           this.el().querySelectorAll('.vjs-load-progress div[data-start]').forEach(function(bar) {             bar.setAttribute('role', 'presentation');             bar.setAttribute('aria-hidden', 'true');           });         });       });     }  }})();&lt;/script&gt;&lt;a class="video-embed-link" href="https://community.checkpoint.com/t5/video/gallerypage/video-id/MzeDh2aDE6R1dvzwvOykbzEjcw1TRfTB"&gt;(view in My Videos)&lt;/a&gt;&lt;/div&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;&lt;SPAN style="color: windowtext;"&gt;SandBlast Agent BlueKeep Event Forensics Report:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;&lt;SPAN style="color: windowtext;"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="BK.jpg" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/1374iAE731A99E43BC111/image-size/large?v=v2&amp;amp;px=999" role="button" title="BK.jpg" alt="BK.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;H6&gt;To learn more about SandBlast Agent's Anti-Exploit protection of BlueKeep, see:&amp;nbsp;&lt;SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk154232" target="_blank" rel="noopener"&gt;sk154232 - Anti-Exploit Protection for Remote Desktop Protocol Vulnerability (CVE-2019-0708)&lt;/A&gt;&lt;/SPAN&gt;&lt;/H6&gt;
&lt;H6&gt;Note: Users who run SandBlast Agent with a third party Anti-Virus (AV) should be aware that Anti-Exploit is turned off in the presence of third party AVs. For this protection to be enabled, you must allow Anti-Exploit to work with third party AVs as detailed in &lt;SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk154454" target="_blank" rel="noopener"&gt;sk154454 - Enabling Anti-Exploit when deployed with a third party Anti-Virus.&lt;/A&gt;&lt;/SPAN&gt;&lt;/H6&gt;</description>
      <pubDate>Tue, 28 May 2019 12:16:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Breaking-News-SandBlast-Agent-Protects-Against-BlueKeep-RDP/m-p/54498#M10887</guid>
      <dc:creator>Yossi_Hasson</dc:creator>
      <dc:date>2019-05-28T12:16:21Z</dc:date>
    </item>
  </channel>
</rss>

