<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic BlueKeep exploit is weaponized: Check Point customers remain protected. in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/BlueKeep-exploit-is-weaponized-Check-Point-customers-remain/m-p/62222#M12631</link>
    <description>&lt;P&gt;The notorious &lt;A href="https://en.wikipedia.org/wiki/BlueKeep" target="_blank"&gt;BlueKeep vulnerability&lt;/A&gt; has been escalated from a theoretical, critical vulnerability, to an&lt;A href="https://www.forbes.com/sites/daveywinder/2019/09/07/us-government-critical-windows-warning-gets-real-as-wormable-exploit-weaponized/#74f21a207569" target="_blank"&gt; &lt;STRONG&gt;immediate, critical threat&lt;/STRONG&gt;&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;While BlueKeep’s devastating potential was always known, it was a theoretical threat, as there was no working exploit code. That code was released into the wild when the open source Metasploit penetration testing framework released a Bluekeep exploit module on September 6. Unfortunately, the Metasploit toolset is used by both security practitioners and cybercriminals alike. By publishing the &lt;A href="https://github.com/rapid7/metasploit-framework/pull/12283" target="_blank"&gt;BlueKeep exploit code&lt;/A&gt; hackers were essentially provided with weaponized, working code that enables the creation of a dangerous worm.&lt;/P&gt;
&lt;P&gt;How serious is the threat? If a single unpatched Windows machine with network admin access is running on a network, the attacker may have access to all in-use credentials to all systems on the network, whether they are running Windows, Linux, MacOS or NetBIOS. In effect, this scenario means that a single, infected Windows machine can completely own a network.&lt;/P&gt;
&lt;P&gt;Check Point’s BlueKeep protections for network and endpoint, released several months ago, protect against the new weaponized version of this attack.&lt;/P&gt;
&lt;P&gt;Check Point customers who have implemented these protections remain protected.&lt;/P&gt;
&lt;P&gt;We recommend all customers to take immediate action to make sure they are protected:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Install the Microsoft patch on all vulnerable Windows systems&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?action=portlets.SearchResultMainAction&amp;amp;eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk154732" target="_blank"&gt;Enable&lt;/A&gt; Check Point’s IPS network protection for BlueKeep&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk154232" target="_blank"&gt;Implement&lt;/A&gt; Check Point’s endpoint protection for BlueKeep&lt;/LI&gt;
&lt;/UL&gt;</description>
    <pubDate>Sun, 08 Sep 2019 18:12:51 GMT</pubDate>
    <dc:creator>Yossi_Hasson</dc:creator>
    <dc:date>2019-09-08T18:12:51Z</dc:date>
    <item>
      <title>BlueKeep exploit is weaponized: Check Point customers remain protected.</title>
      <link>https://community.checkpoint.com/t5/General-Topics/BlueKeep-exploit-is-weaponized-Check-Point-customers-remain/m-p/62222#M12631</link>
      <description>&lt;P&gt;The notorious &lt;A href="https://en.wikipedia.org/wiki/BlueKeep" target="_blank"&gt;BlueKeep vulnerability&lt;/A&gt; has been escalated from a theoretical, critical vulnerability, to an&lt;A href="https://www.forbes.com/sites/daveywinder/2019/09/07/us-government-critical-windows-warning-gets-real-as-wormable-exploit-weaponized/#74f21a207569" target="_blank"&gt; &lt;STRONG&gt;immediate, critical threat&lt;/STRONG&gt;&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;While BlueKeep’s devastating potential was always known, it was a theoretical threat, as there was no working exploit code. That code was released into the wild when the open source Metasploit penetration testing framework released a Bluekeep exploit module on September 6. Unfortunately, the Metasploit toolset is used by both security practitioners and cybercriminals alike. By publishing the &lt;A href="https://github.com/rapid7/metasploit-framework/pull/12283" target="_blank"&gt;BlueKeep exploit code&lt;/A&gt; hackers were essentially provided with weaponized, working code that enables the creation of a dangerous worm.&lt;/P&gt;
&lt;P&gt;How serious is the threat? If a single unpatched Windows machine with network admin access is running on a network, the attacker may have access to all in-use credentials to all systems on the network, whether they are running Windows, Linux, MacOS or NetBIOS. In effect, this scenario means that a single, infected Windows machine can completely own a network.&lt;/P&gt;
&lt;P&gt;Check Point’s BlueKeep protections for network and endpoint, released several months ago, protect against the new weaponized version of this attack.&lt;/P&gt;
&lt;P&gt;Check Point customers who have implemented these protections remain protected.&lt;/P&gt;
&lt;P&gt;We recommend all customers to take immediate action to make sure they are protected:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Install the Microsoft patch on all vulnerable Windows systems&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?action=portlets.SearchResultMainAction&amp;amp;eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk154732" target="_blank"&gt;Enable&lt;/A&gt; Check Point’s IPS network protection for BlueKeep&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk154232" target="_blank"&gt;Implement&lt;/A&gt; Check Point’s endpoint protection for BlueKeep&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Sun, 08 Sep 2019 18:12:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/BlueKeep-exploit-is-weaponized-Check-Point-customers-remain/m-p/62222#M12631</guid>
      <dc:creator>Yossi_Hasson</dc:creator>
      <dc:date>2019-09-08T18:12:51Z</dc:date>
    </item>
  </channel>
</rss>

