Initiatives for
As the national authority for Cybersecurity the CCB has developed several initiatives for specific publics which are presented here.
Reference:
Advisory #2019-013
Version:
2.0
Affected software:
All supported versions of Windows 10, including server versions
Windows 2003
Windows 2008 & 2008 R2
Windows 7
Windows XP
Type:
Remote Code Execution
CVE/CVSS:
CVE-2019-0708, CVE-2019-118, CVE-2019-11821, CVE-2019-1222, CVE-2019-1226 - CVE Score: 9.8
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1181
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1182
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1222
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1226
This RDP vulnerability has been dubbed ""Bluekeep"". There is now a proof-of-concept code available. This increases the risk of exploitation of the vulnerability. CERT.be recommends immediate patching.
Complete compromise of system availability, confidentiality of system data, and/or system integrity, with a strong possibility of compromised systems becoming part of a wider attack vector similar to what was seen in 2017 in the case of Wannacry.
An unauthenticated attacker can remotely execute run arbitrary code via maliciously crafted input leading to exploitation of vulnerabilities in Microsoft Windows RDP service. The fact that Microsoft has chosen to provide patches for Windows 2003 and Windows XP demonstrates how critical this vulnerability is and the urgency of system administrators applying the necessary patches.
Newer versions of Windows (starting from Windows 8 and Server 2012) are not impacted.
Update 14/08/2019: All versions of Microsoft Windows except XP and 2003 are impacted for the following CVE’s:
• CVE-2019-1181
• CVE-2019-1182
• CVE-2019-1222
• CVE-2019-122
CERT.be recommends administrators to update their Microsoft Windows systems with the latest available patches as soon as possible:
Update 14/08/2019:
If the patching cannot be done immediately, you can apply several mitigations: