Lucene search

K
myhack58佚名MYHACK58:62201994152
HistoryMay 15, 2019 - 12:00 a.m.

CVE-2019-0708: Windows RDP service worms level vulnerability alerts-a vulnerability alert-the black bar safety net

2019-05-1500:00:00
佚名
www.myhack58.com
181

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.975 High

EPSS

Percentile

100.0%

2019 5 May 14, Microsoft officially released security patches, repair the Windows Remote Desktop service remote code execution vulnerability, the vulnerability affects some older versions of Windows system. This vulnerability is pre-authentication and without user interaction, this means that this vulnerability by the network worm’s way is utilized. Using this vulnerability, any malicious software are possible from the infected computer to spread to other vulnerable computers, in a manner and 2017 WannaCry malware spread in a similar way.
Through the assessment, the 360-CERT confirmed the vulnerability severity, and recommends users immediately patch update process.

0x01 affect the scope of the
Windows 7
Windows Server 2008 R2
Windows Server 2008
Windows 2003
Windows XP
Windows 8 and Windows 10 and later version users are not affected by this vulnerability.

0x02 repair recommendations
Through the installation of 360 security guards ( http://weishi.360.cn/ )for a key update
For Windows 7 and Windows Server 2008 users, timely installation of Windows security updates that were released
For Windows 2003 and Windows XP users, to update system version
Interim hazard mitigation measures:
Open the network authentication NLA)

0x03 timeline
2019-05-14 the official Microsoft Security Bulletin
2019-05-15 360CERT warning

0x04 reference links
https://blogs.technet.microsoft.com/msrc/2019/05/14/prevent-a-worm-by-updating-remote-desktop-services-cve-2019-0708/
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.975 High

EPSS

Percentile

100.0%