Protect Remote Desktop Services against BlueKeep/DejaBlue exploits
Why BlueKeep is dangerous?
BlueKeep exploit allows a remote code execution without authentication.
Any PC with active Remote Desktop may be exploited remotely!
This is a "wormable" vulnerability. A "worm" virus quickly spreads across a local network.
BlueKeep affects Windows 7, Windows Server 2008, and Windows Server 2008 R2.
BlueKeep was reported in May 2019 and patched by Microsoft on May 14.
"DejaBlue" is a code name for several vulnerabilities in the Microsoft Remote Desktop Services: CVE-2019-1181, CVE-2019-1182.
"DejaBlue" was discovered on 13 August 2019. It affects all recent versions of the operating system up to Windows 10, as well as the older Windows versions.
There is no guarantee that all bugs fixed.
You can not feel safe!
You should configure your system to stay away from new attacks.
The best way:
Disable Remote Desktop Services if they are not required!
If you use Remote Desktop Services every day, use a workaround:
Enable Network Level Authentication (NLA)
With NLA turned on, an attacker would first need to be authenticated using a valid account.
A visual indicator on the main screen shows the current status of Remote Desktop Services protection.
Click on an indicator to display options: