CVE-2019-0708

critical

Description

A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'.

From the Tenable Blog

CVE-2019-0708: BlueKeep Exploited in the Wild to Deliver Cryptocurrency Miner
CVE-2019-0708: BlueKeep Exploited in the Wild to Deliver Cryptocurrency Miner

Published: 2019-11-04

Researchers identify the first in-the-wild exploit of the BlueKeep vulnerability nearly six months after it was disclosed. Background On November 2, security researchers Kevin Beaumont (@GossiTheDog) and Marcus Hutchins (@MalwareTechBlog) confirmed the first in-the-wild exploitation of CVE-2019-0708, also known as BlueKeep.

Critical 'BlueKeep' Vulnerability CVE-2019-0708 Addressed in Patch Tuesday Updates
Critical 'BlueKeep' Vulnerability CVE-2019-0708 Addressed in Patch Tuesday Updates

Published: 2019-05-14

Microsoft has released its May 2019 Security Updates, which includes a fix for BlueKeep (CVE-2019-0708), a critical remote code execution vulnerability affecting the Remote Desktop Service.

CVE-2019-0708: BlueKeep Exploits Could Be Around the Corner
CVE-2019-0708: BlueKeep Exploits Could Be Around the Corner

Published: 2019-08-01

Nearly 80 days after the announcement of BlueKeep, threats of exploitation remain. Those who have not patched remain at risk as rumors of exploit scripts surface.

WatchBog Malware Adds BlueKeep Scanner (CVE-2019-0708), New Exploits (CVE-2019-10149, CVE-2019-11581)
WatchBog Malware Adds BlueKeep Scanner (CVE-2019-0708), New Exploits (CVE-2019-10149, CVE-2019-11581)

Published: 2019-07-25

Scanner for “BlueKeep” vulnerability and newly minted exploits for Exim and Jira incorporated into cryptocurrency mining malware.

References

http://packetstormsecurity.com/files/153133/Microsoft-Windows-Remote-Desktop-BlueKeep-Denial-Of-Service.html

http://packetstormsecurity.com/files/153627/Microsoft-Windows-RDP-BlueKeep-Denial-Of-Service.html

http://packetstormsecurity.com/files/154579/BlueKeep-RDP-Remote-Windows-Kernel-Use-After-Free.html

http://packetstormsecurity.com/files/155389/Microsoft-Windows-7-x86-BlueKeep-RDP-Use-After-Free.html

http://packetstormsecurity.com/files/162960/Microsoft-RDP-Remote-Code-Execution.html

https://cert-portal.siemens.com/productcert/pdf/ssa-166360.pdf

https://cert-portal.siemens.com/productcert/pdf/ssa-406175.pdf

https://cert-portal.siemens.com/productcert/pdf/ssa-433987.pdf

https://cert-portal.siemens.com/productcert/pdf/ssa-616199.pdf

https://cert-portal.siemens.com/productcert/pdf/ssa-832947.pdf

https://cert-portal.siemens.com/productcert/pdf/ssa-932041.pdf

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708

https://www.cisa.gov/sites/default/files/2023-08/aa23-215a_joint_csa_2022_top_routinely_exploited_vulnerabilities.pdf

https://www.microsoft.com/security/blog/2019/11/07/the-new-cve-2019-0708-rdp-exploit-attacks-explained/

http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190529-01-windows-en

http://www.huawei.com/en/psirt/security-notices/huawei-sn-20190515-01-windows-en

Details

Source: Mitre, NVD

Published: 2019-05-16

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical