Tech

After Microsoft Releases Patches for RPC Exploit: What Honeypot Sees

old slashdot leader under attack writes: SANS Internet Storm Center, a recent remote procedure call vulnerability after Microsoft patched and released CVE-2022-26809 Complete Windows 10 system setup Expose port 445/TCP “to the world”. The system is not patched for RPC vulnerabilities. However, there have been thousands of attacks on SMB so far, but no new RPC vulnerabilities yet….

But still, attackers are still heavily exploiting other vulnerabilities such as ETERNALBLUE as well.
From the article:
Shouldn’t the April patch be in a hurry? Absolutely not. I hope you have already applied the patch. However, the April Windows patch had a few additional gems as well as a patch for RPC. Less chatter about CVE-2022-26809, but says: Sometimes being quiet is dangerous and people who can exploit this vulnerability may not broadcast what they are doing on social media.

This article is from Johannes B. Ullrich, Ph.D. , Director of Research at the secure site SANS.edu.

Interestingly, Ulrich’s writings are hyperlinked. Google+ Profile Haven’t been able to use it for almost 3 years.

After Microsoft Releases Patches for RPC Exploit: What Honeypot Sees

Source link After Microsoft Releases Patches for RPC Exploit: What Honeypot Sees

Back to top button