CVE-2019-0708 AKA Bluekeep


Fadhli Rais

Poster 2.0
Verified Provider
Teman teman DWH sudah tau celah keamanan ini ?

Dilansir oleh microsoft.com

A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems Remote Desktop Service via RDP.
The update addresses the vulnerability by correcting how Remote Desktop Services handles connection requests.

OS apa yang terkena dampak ?
Windows XP, Windows Vista, Windows 7, Windows Server 2003 dan Windows Server 2008

Saran pertama untuk antisipasi ?
ganti port RDP (jangan default 3389)


artikel lain :
https://inet.detik.com/security/d-4607595/ancaman-bluekeep-yang-bahaya-terstruktur-dan-sistematis-di-ri
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708
 

antochoy

Apprentice 2.0
Verified Provider
nice share
bisa juga diminimalisir blocking firewall windows
cari IP yang listeningnya : SYN_RECEIVED lalu masukan ke dalam LIST BLOCK IP
-------------------------------------------------------------------------------------
C:\Users\Administrator>netstat -a -o | find "3389"
TCP 0.0.0.0:3389 win7-PC:0 LISTENING 376
TCP 103.xx.xxx.xx:3389 128.199.36.85:36055 SYN_RECEIVED 376
TCP 103.xx.xxx.xx:3389 128.199.36.85:36798 SYN_RECEIVED 376
TCP 103.xx.xxx.xx:3389 128.199.36.85:45996 SYN_RECEIVED 376
TCP 103.xx.xxx.xx:3389 128.199.36.85:55179 SYN_RECEIVED 376
TCP [::]:3389 win7-PC:0 LISTENING 376
-------------------------------------------------------------------------------------
 

    
Top