Cyber risk and advisory programs that identify security gaps and build strategies to address them.
MDR that provides improved detection, 24/7 threat hunting, end-to-end coverage and most of all, complete Response.
Our team delivers the fastest response time in the industry. Threat suppression within just 4 hours of being engaged.
Be protected by the best from Day 1.
24/7 Threat Investigation and Response.
Expert hunting, research and content.
Defend brute force attacks, active intrusions and unauthorized scans.
Safeguard endpoints 24/7 by isolating and remediating threats to prevent lateral spread.
Investigation and enhanced threat detection across multi-cloud or hybrid environments.
Configuration escalations, policy and posture management.
Detects malicious insider behavior leveraging Machine Learning models.
Customer testimonials and case studies.
Stories on cyberattacks, customers, employees, and more.
Cyber incident, analyst, and thought leadership reports.
Demonstrations, seminars and presentations on cybersecurity topics.
Information and solution briefs for our services.
MITRE ATT&CK Framework, Cybersecurity Assessment, SOC Calculator & more
On May 14th, Microsoft released a security update for a critical vulnerability in Microsoft Remote Desktop Services. The vulnerability is being tracked as CVE-2019-0708. If exploited, a remote and unauthenticated attacker can execute arbitrary code by sending crafted requests. User interaction is not required for successful exploitation.
Exploitation of CVE-2019-0708 has not been noted by Microsoft at this time. Due to the prevalence of RDP and the nature of this vulnerability, eSentire recommends customers take immediate action to address this vulnerability if impacted.
Denial of Service (DoS) proof-of-concept code is now publicly available on GitHub. This is likely to decrease the time until exploitation by threat actors occurs and emphasizes the need for organizations to patch CVE-2019-0708 as soon as possible. [3]
What we’re doing about it
What you should do about it
Additional information
CVE-2019-0708 can be exploited by attackers via specially crafted requests sent to through RDP to target systems. Technical details on this vulnerability are limited at this time.
If successfully exploited, CVE-2019-0708 would allow for a wide variety of malicious activity including installing programs, changing data and creating additional user accounts with full user rights.
Affected Windows Versions:
Affected Out-of-Support Versions:
Microsoft has assessed this as “Exploitation More Likely” for impacted systems. Organizations are encouraged to treat with high priority.
References:
[1] https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708
[2] https://support.microsoft.com/en-gb/help/4500705/customer-guidance-for-cve-2019-0708