Security advisories

RDP Remote Code Execution - CRITICAL

June 19, 2019 | 1 MIN READ

Speak With A Security Expert Now

TALK TO AN EXPERT

On May 14th, Microsoft released a security update for a critical vulnerability in Microsoft Remote Desktop Services. The vulnerability is being tracked as CVE-2019-0708. If exploited, a remote and unauthenticated attacker can execute arbitrary code by sending crafted requests. User interaction is not required for successful exploitation.

Exploitation of CVE-2019-0708 has not been noted by Microsoft at this time. Due to the prevalence of RDP and the nature of this vulnerability, eSentire recommends customers take immediate action to address this vulnerability if impacted.

Denial of Service (DoS) proof-of-concept code is now publicly available on GitHub. This is likely to decrease the time until exploitation by threat actors occurs and emphasizes the need for organizations to patch CVE-2019-0708 as soon as possible. [3]

What we’re doing about it

What you should do about it

Additional information

CVE-2019-0708 can be exploited by attackers via specially crafted requests sent to through RDP to target systems. Technical details on this vulnerability are limited at this time.

If successfully exploited, CVE-2019-0708 would allow for a wide variety of malicious activity including installing programs, changing data and creating additional user accounts with full user rights.

Affected Windows Versions:

Affected Out-of-Support Versions:

Microsoft has assessed this as “Exploitation More Likely” for impacted systems. Organizations are encouraged to treat with high priority.

References:

[1] https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708

[2] https://support.microsoft.com/en-gb/help/4500705/customer-guidance-for-cve-2019-0708

[3] https://blogs.technet.microsoft.com/msrc/2019/05/30/a-reminder-to-update-your-systems-to-prevent-a-worm/

View Most Recent Advisories