![]() UPDATE 20190515: Chaouki Bekrar of Zerodium has publicly confirmed the exploitability of the vulnerability via a tweet. Additionally, NCC group has published an initial Suricata detection rule. UPDATE 20190521: A PoC targeting Windows XP SP3 (only) is being worked on in a public Github repository, under the username “digital-missiles”. UPDATE 20190521: A PoC check (not Exploit!) for XP and Windows 7 is now available with the Metasploit port in progress. UPDATE 20190523: Another WIP POC from Currently blue-screening, not landing. UPDATE 20190525: A Metasploit Scanner Module is now available. UPDATE 20190528: Rob Graham posted some analysis indicating close to a million systems directly exposed to the internet are vulnerable. UPDATE 20190531: An excellent technical analysis and writeup of BlueKeep from 20190530: Additional Guidance from Microsoft, again, urging users to patch. UPDATE 20190603: Additional exposure analysis from Intrigue.io, indicating at least 17 of the Fortune 500 are still vulnerable to Bluekeep. UPDATE 20190604: Notice of a functional, private MSF module posted by to Twitter. UPDATE 20190604: The NSA is now urging organizations to patch. UPDATE 20190719: A technical document from Keenlab was posted detailing how to exploit the vulnerability. UPDATE 20190723: A working exploit is now available in Immunity Canvas. UPDATE 20190906: Rapid7 published a Bluekeep Metasploit module in a Pull Request on Github, after holding it back from the public since its existence was announced in May. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |