On May 14th, Microsoft released a security update for a critical vulnerability in Microsoft Remote Desktop Services. The vulnerability is being tracked as CVE-2019-0708. If exploited, a remote and unauthenticated attacker can execute arbitrary code by sending crafted requests. User interaction is not required for successful exploitation.

Exploitation of CVE-2019-0708 has not been noted by Microsoft at this time. Due to the prevalence of RDP and the nature of this vulnerability, eSentire recommends customers take immediate action to address this vulnerability if impacted.

Denial of Service (DoS) proof-of-concept code is now publicly available on GitHub. This is likely to decrease the time until exploitation by threat actors occurs and emphasizes the need for organizations to patch CVE-2019-0708 as soon as possible. [3]

What we’re doing about it

  • New MVS (formerly esRECON) local Windows plugins identify this vulnerability
  • The Threat Intelligence team is monitoring this topic for additional information

What you should do about it

  • After performing a business impact review, apply the official Microsoft security updates to affected systems [1] [2]
  • If RDP is not actively required, consider disabling the service or limiting access

Additional information

CVE-2019-0708 can be exploited by attackers via specially crafted requests sent to through RDP to target systems. Technical details on this vulnerability are limited at this time.

If successfully exploited, CVE-2019-0708 would allow for a wide variety of malicious activity including installing programs, changing data and creating additional user accounts with full user rights.

Affected Windows Versions:

  • Windows 7
  • Windows Server 2008 R2 (various versions)
  • Windows Server 2008 (various versions)

Affected Out-of-Support Versions:

  • Windows XP (various versions)
  • Windows Server 2003 (various versions)

Microsoft has assessed this as “Exploitation More Likely” for impacted systems. Organizations are encouraged to treat with high priority.

References:

[1] https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708

[2] https://support.microsoft.com/en-gb/help/4500705/customer-guidance-for-cve-2019-0708

[3] https://blogs.technet.microsoft.com/msrc/2019/05/30/a-reminder-to-update-your-systems-to-prevent-a-worm/

 

See the latest security advisories

Articles and reports written by eSentire staff and our Threat Intelligence Research Group.

Ready to get started?
We're here to help.

Get Started
Reach out to schedule a meeting and learn more about our Managed Detection and Response, Risk Advisory and Managed Prevention capabilities.