Welcome, Guest. Please login or register.

Author Topic: RDP Vulnerability Found, But Microsoft Won’t Patch It  (Read 557 times)

0 Members and 1 Guest are viewing this topic.

Online CMDL_GUY

  • Administrator
  • Location: Mt. Sidney Virginia
  • Posts: 8183
    • www.lscg.net
"Government is not reason; it is not eloquent; it is force. Like fire, it is a dangerous servant and a fearful master." - George Washington

“Remember democracy never lasts long. It soon wastes, exhausts, and murders itself. There never was a democracy yet, that did not commit suicide.”   -John Adams

K4LRM

www.lscg.net

Faster horses, younger women, older whiskey, more money.

Online MacGyver

  • Administrator
  • Location: Dallas, Texas
  • Posts: 4634
Re: RDP Vulnerability Found, But Microsoft Won’t Patch It
« Reply #1 on: June 10, 2019, 09:51:30 AM »
It's going to be an ongoing problem.  We set up an MSP with PCMatic (from that website) a while back and have been playing with it in Beta.  We're scheduled to roll it out WAN wide this weekend and hopefully sleep a little better. 
-I'm only here because my flux capacitor is broken.

Online Keighlar

  • Moderator
  • Location: New Hampshire
  • Posts: 1605
Re: RDP Vulnerability Found, But Microsoft Won’t Patch It
« Reply #2 on: June 10, 2019, 03:39:15 PM »
Looks like it's being taken a step further.

http://www.thundercloud.net/infoave/new/bluekeep-warning-issued-by-microsoft/
Much like the NSA-authored worm that [was] stolen by hackers, modified and foisted upon Internet users in the form of the WannaCry worm that infected hundreds of thousands of computers back in 2017, a new NSA worm called EternalBlue was stolen by a hacking group known as the Shadow Brokers and is set to be unleashed upon unpatched Windows  7 (and older versions of Windows ) computers as the BlueKeep worm.

The BlueKeep worm is a Remote Desktop Services Remote Code Execution Vulnerability.
“You know you’re in love when you can’t fall asleep because reality is finally better than your dreams.”
Dr Seuss