Your Web News in One Place

Help Webnuz

Referal links:

Sign up for GreenGeeks web hosting
April 30, 2022 05:34 pm

After Microsoft Releases Patch for RPC Exploit: What the Honeypot Saw

Long-time Slashdot reader UnderAttack writes: After Microsoft patched and went public with CVE-2022-26809, the recent Remote Procedure Call vulnerability, the SANS Internet Storm Center set up a complete Windows 10 system exposing port 445/TCP "to the world." The system is not patched for the RPC vulnerability. But so far, while it has seen thousands of attacks against SMB a day, nothing yet for the new RPC vulnerability.... But still, attackers are heavily hitting other vulnerabilities like of course still ETERNALBLUE From the article:Should you stop rushing out the April patch? Absolutely not. I hope you are already done applying the patch. But the April Windows patch had several additional gems, not just patches for RPC. Chatter about CVE-2022-26809 has died down, but as they say: Sometimes the quiet ones are the dangerous ones, and people able to exploit this vulnerability may not broadcast what they are doing on social media. The article is credited to Johannes B. Ullrich, Ph.D. , Dean of Research at the security site SANS.edu. Interestingly, Ullrich's byline is hyperlinked to a Google+ profile which has been unavailable for nearly three years.

Read more of this story at Slashdot.


Original Link: https://tech.slashdot.org/story/22/04/30/0236215/after-microsoft-releases-patch-for-rpc-exploit-what-the-honeypot-saw?utm_source=rss1.0mainlinkanon&ut

Share this article:    Share on Facebook
View Full Article

Slashdot

Slashdot was originally created in September of 1997 by Rob "CmdrTaco" Malda. Today it is owned by Geeknet, Inc..

More About this Source Visit Slashdot