A security researcher under the Twitter handle @zerosum0x0 has recently disclosed his Remote Desktop Protocol (RDP) exploit for the BlueKeep vulnerability to Metasploit.
The disclosure, once made available to the public, is anticipated to increase the amount of RDP scanning actively, increasing the chances of attempted exploitation of unpatched systems.
The BlueKeep vulnerability was first noted by the NCSC in May. According to a recent report from cyber security firm BitSight, ‘approximately 788,214 systems remain vulnerable’ to the exploit.
We advise patching to resolve the BlueKeep vulnerability; links for which can be found below or alternatively you can use Windows Update:
Furthermore, Microsoft has published its own additional advice and guidance.
Duncan is a technology professional with over 20 years experience of working in various IT roles. He has a interest in cyber security, and has a wide range of other skills in radio, electronics and telecommunications.