Welcome, Guest. Please login or register.

Author Topic: RDP Vulnerability Found, But Microsoft Won’t Patch It  (Read 1472 times)

0 Members and 1 Guest are viewing this topic.


  • Administrator
  • Location: Mt. Sidney Virginia
  • Posts: 8584
    • www.lscg.net
"Government is not reason; it is not eloquent; it is force. Like fire, it is a dangerous servant and a fearful master." - George Washington

“Remember democracy never lasts long. It soon wastes, exhausts, and murders itself. There never was a democracy yet, that did not commit suicide.”   -John Adams



Faster horses, younger women, older whiskey, more money.

Offline MacGyver

  • Administrator
  • Location: Dallas, Texas
  • Posts: 4722
Re: RDP Vulnerability Found, But Microsoft Won’t Patch It
« Reply #1 on: June 10, 2019, 09:51:30 AM »
It's going to be an ongoing problem.  We set up an MSP with PCMatic (from that website) a while back and have been playing with it in Beta.  We're scheduled to roll it out WAN wide this weekend and hopefully sleep a little better. 
-I'm only here because my flux capacitor is broken.

Online Keighlar

  • Moderator
  • Location: New Hampshire
  • Posts: 1711
Re: RDP Vulnerability Found, But Microsoft Won’t Patch It
« Reply #2 on: June 10, 2019, 03:39:15 PM »
Looks like it's being taken a step further.

Much like the NSA-authored worm that [was] stolen by hackers, modified and foisted upon Internet users in the form of the WannaCry worm that infected hundreds of thousands of computers back in 2017, a new NSA worm called EternalBlue was stolen by a hacking group known as the Shadow Brokers and is set to be unleashed upon unpatched Windows  7 (and older versions of Windows ) computers as the BlueKeep worm.

The BlueKeep worm is a Remote Desktop Services Remote Code Execution Vulnerability.
“You know you’re in love when you can’t fall asleep because reality is finally better than your dreams.”
Dr Seuss