Since BlueKeep is very popular, it would be beneficial to known the mechanism behind the exploit. RDP connects two machines via RDP through 32 virtual channels. One of the channels named MS_T120 does not require to be connected by the client. However, if it is used for connection by the client, memo...
Since BlueKeep is very popular, it would be beneficial to known the mechanism behind the exploit. RDP connects two machines via RDP through 32 virtual channels. One of the channels named MS_T120 does not require to be connected by the client. However, if it is used for connection by the client, memory corruption occurs and the attacker will be able to execute commands remotely on the target machine.
BlueKeep vulnerability is wormable. This means that it can replicate itself and spread to other machines in the network. Wormable vulnerabilities may create a massive damage, especially to the companies because companies have a lot of machines connected to the same network.
Size: 702.9 KB
Language: en
Added: Oct 01, 2025
Slides: 4 pages
Slide Content
RDP AttacksExplained
Threat Intelligence Team
05.06.2022
BD02112102
A
uthor: Cyber Threat
Intelligence
Team
Release Date:
05.06.2022
Report ID: 02112102
2
What is RDP?
RDP (Remote Desktop Protocol) is a protocol which provides connection to a
remote machine. It is a service built for Windows, but anyone can connect to an RDP
port via such tools from different operating systems. You can have a control of a
remote machine from its Graphical User Interface, unlike telnet or SSH. Telnet and
SSH provides you to control a remote machine from its Command Line Interface.
Therefore, RDP is more comfortable to connect and having the control of a remote
machine. You need to know the name or IP address of the remote machine,
username and password in order to connect to it.
RDP is mostly used in corporate networks. Employees who want to do their job
remotely, connect to their work computer via RDP. As the remote jobs are more
prevalent nowadays, employees tend to work from remote locations and thus, RDP
becomes more important. Another usage reason is that an IT employee may want to
log into your computer remotely to fix an issue.
RDP Attacks
Attack Types and Vulnerabilities
•BruteforceattacksonRDPcanbedoneviaautomatedtools,iftheRDPportis
open.Thisattackisusefulwhentheusernamesandpasswordsareeasytoguess
andrelatedtothetarget’sprivatelife(name,city,petname,etc.).
•BlueKeepvulnerability(CVE-2019-0708)providesattackerstoexecutecommands
remotelyonthetargetmachine.Thisvulnerabilityispopularandcanbefoundin
themetasploitexploitmodule.
•Thereare103CVERecordsforRDPvulnerabilities.Youmaywanttolookatthem:
https
://cve.mitre.org/cgi- bin/cvekey. cgi?keyword=rdp
BlueKeep Mechanism
SinceBlueKeepisverypopular,itwouldbebeneficialtoknownthemechanism
behindtheexploit.RDPconnectstwomachinesviaRDPthrough32virtual
channels.OneofthechannelsnamedMS_T120doesnotrequiretobeconnectedby
theclient.However,ifitisusedforconnectionbytheclient,memorycorruption
occursandtheattackerwillbeabletoexecutecommands remotelyonthetarget
machine.
BlueKeepvulnerabilityiswormable.Thismeansthatitcanreplicateitselfandspread
toothermachinesinthenetwork.Wormablevulnerabilitiesmaycreateamassive
damage,especiallytothecompaniesbecausecompanieshavealotofmachines
connectedtothesamenetwork.