Lucene search

K
myhack58佚名MYHACK58:62201994162
HistoryMay 15, 2019 - 12:00 a.m.

Windows re-aeration“WannaCry”level vulnerability CVE-2019-0708, cures XP, Win7-vulnerability warning-the black bar safety net

2019-05-1500:00:00
佚名
www.myhack58.com
545

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.975 High

EPSS

Percentile

100.0%

In WannaCry two-year anniversary, Windows is again exposed to the presence of high-risk remote vulnerability. 5 on 15 May, Microsoft official released the 5, on security update patches a total fix 82 vulnerabilities, which contains for Remote Desktop RDP services remote code execution vulnerability CVE-2019-0708 the.
!
According to the Microsoft Security Response Center MSRC published a blog post, the Remote Desktop Protocol RDP in itself is not easy to receive the attack, this vulnerability is pre-authentication, without user interaction. This means that the use of this vulnerability and any future malicious software are possible with the 2017 WannaCry malicious software all over the world in a similar manner, from vulnerable computers to spread to other computers.
To exploit the vulnerability, an attacker could install programs, view, change, or delete data, or create with full user permissions to the new account. This vulnerability exists temptation imaginable, as long as the POC release, it is possible to in the most people did not have time to update the case of the repetition of WannaCry it.
But so far, also did not find any malicious behavior exploit this vulnerability, GitHub appears on many take advantage of this message lie Star, fishing or prank.
! [](/Article/UploadPic/2019-5/201951519518174. png)
You think is an exploit…
! [](/Article/UploadPic/2019-5/201951519518566. png)
Just wanted to tell you: Never Gonna Give You Up.
CVE-2019-0708 vulnerability scope:
Windows 7
Windows Server 2008 R2
Windows Server 2008
Windows Server 2003 has stopped maintenance
Windows XP has stopped maintenance
In addition to Win8, Win 10 with almost all Windows versions are affected by this vulnerability. Although Microsoft has stopped the Windows 2003 and Windows XP support, but due to this vulnerability the degree of harm is high, Microsoft the repair patch covering all of the affected versions of Windows.
Safety recommendations

  1. Temporary coping methods
    In the affected versions of the system enable network level authentication, NLA; to enable NLA, the attacker needs to use on the target system to a valid account on the Remote Desktop Services authentication, to successfully exploit the vulnerability.
    Microsoft’s official recommendation, regardless of whether to open the NLA, should be updated as soon as possible, the complete elimination of the vulnerability.
  2. Security patches
    Since Win8 and Win 10 is not affected by CVE-2019-0708 vulnerability, so these users can be assured. For Win 7 and Server 2008 users, you can directly through the system automatically updates the installed vulnerability patches. If you have already closed the system automatically updates, can from the following links to download the corresponding version of the patch installation:
    https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708
    For Windows 2003 and Windows XP users, since the official has stopped support, not through auto update install the patch, you need to manually through the following address to download the security patches self install 360 security guards users can through the“loophole repair”function of the shortcut to install the patch: the
    https://support.microsoft.com/zh-cn/help/4500705/customer-guidance-for-cve-2019-0708

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.975 High

EPSS

Percentile

100.0%