Friday, July 5, 2019

SandBlast Agent Protects Against BlueKeep RDP Vulnerability

Lately, a burglar advisory was launched for any vulnerability in RDP (Remote Desktop Protocol) affecting multiple Home windows Os's just before 8.1. Based on Microsoft’s advisory, this vulnerability could be exploited for remote code execution and denial and services information attacks. All of this without requiring the credentials from the target machine.

Check Point’s SandBlast Agent Anti-Exploit now monitors the RDP service for Home windows 7 and Home windows 2008R2 and has the capacity to prevent this attack from occurring. Not just is SandBlast Agent in a position to avoid the exploit from being delivered on unpatched systems, but it's also in a position to avoid the exploit from being sent to the formerly vulnerable driver in patched systems.

The security will come in SandBlast Agent’s E80.97 Client Version

To determine Anti-Exploit’s protection for action please visit the next video, where our Threat Research Group’s POC employed for exploitation is blocked. Additionally, you may also observe how we could block the scan from the Metasploit module which was lately designed to identify vulnerable systems.

No comments:

Post a Comment