Update [05.21.2019]: Using information from their research and from public scripts, security professionals at NCC Group have created a network detection rule for CVE-2019-0708. After testing with Suricata IDS/IPS, NCC Group made it publicly available.


Security researchers have created exploits for the remote code execution vulnerability in Microsoft's Remote Desktop Services, tracked as CVE-2019-0708 and dubbed BlueKeep, and hackers may not be far behind.

While the vulnerability inspired some playful users to create fake proof-of-concept code intended for rickrolling, it is no joke. As Remote Desktop Services is commonly exposed to the public so that users can gain remote access to their internal computers, successful exploitation could allow access to an entire network.

Microsoft released a patch for the flaw on May 14 and described it as being "wormable" - not requiring user interaction, and allowing malware to propagate to vulnerable machines "in a similar way as the WannaCry malware spread across the globe in 2017." The severity score of the flaw is 9.8 out of 10, which makes it critical.

CVE-2019-0708 is definitely exploitable for RCE

The first to confirm that BlueKeep is exploitable was zero-days acquisition platform Zerodium, through its founder, Chaouki Bekrar. He said that the exploit works remotely without authentication and grants the attacker the highest privileges on vulnerable Windows Server 2008 and Window 7, and the out-of-support versions Windows 2003 and XP.

Other researchers posted that they had created a working exploit code for the BlueKeep vulnerability. 

On Saturday, security researcher Valthek announced that he was able to create proof-of-concept code that triggered the RDS bug. However, he would not provide more details about this.

Christiaan Beek, senior principal engineer at McAfee, confirmed that Valthek's proof-of-concept (PoC) code was working and urged "everyone to PATCH," adding that the issue was indeed very serious.

The code was not released and neither were the technical details, but Beek said that the PoC was successful for remote code execution on Windows XP, which Microsoft retired years ago, yet bothered to patch it against BlueKeep; this is a clear indicator that there are businesses relying on old XP that are sufficiently important to receive a critical update.

Beek says that the vulnerability is related to the Remote Desktop Protocol (RDP). He recommends disabling it if it is not needed and applying the patch. As a further precaution, he advises cutting direct RDP access and limiting internal usage.

Boris Larin of Kaspersky also analyzed the vulnerability and developed detections to prevent exploitation attempts. His tweet also lacks technical details but comes with an animated picture showing that the blue screen of death was triggered on a virtual Windows XP machine.

Since methods to protect against BlueKeep are available, Larin said that Kaspersky would like to share them with trusted industry partners. Anyone interested in the details should contact the company.

A vulnerability does not necessarily need to lead to the expected effect in order to determine that it is exploitable, and an unpredicted outcome is sufficient to create methods that prevent leveraging it.

Safe method to find vulnerable machines

Admins that have not installed the patch may want to apply the update, lest they risk hackers brewing a working exploit and the aftermath that comes with it.

If they don't want to blindly update systems, Zheng Wenbin, the head of 360Vulcan - Qihoo360's vulnerability research team - announced that they have a safe option to determine which machines are impacted by the issue, without triggering the vulnerability.

This is done via RDP packet behavior and the researcher says that it does not cause a blue screen of death (BSOD) so it can be used safely on the network.

The scan tool is not available for download. To get it and scan the network, one has to contact Qihoo360's CERT department.

CVE-2019-0708 was reported privately to Microsoft by the UK's National Cyber Security Centre (NCSC), there is no public indication at the moment that it is exploited in the wild.

This may soon change when technical details will emerge or hackers manage to put together the pieces to understand exactly how to trigger BlueKeep in a way that gives them execution rights on vulnerable systems.

Microsoft says that there is a strong possibility for malicious actors to write a valid exploit and add it to their malware. As such, the general consensus is to install the patch as quickly as possible. If a valid exploit makes it on GitHub, there's a bot that keeps track of the repos associated with CVE-2019-0708.

Related Articles:

QNAP QTS zero-day in Share feature gets public RCE exploit

PoC exploit released for RCE zero-day in D-Link EXO AX4800 routers

Widely used modems in industrial IoT devices open to SMS attack

Over 50,000 Tinyproxy servers vulnerable to critical RCE flaw

HPE Aruba Networking fixes four critical RCE flaws in ArubaOS