Blog
Sushmita Kalashikar

CVE-2019-0708 – A Critical “Wormable” Remote Code Execution Vulnerability in Windows RDP

May 17, 2019
0
Estimated reading time: 2 minutes

This is an important security advisory related to a recently patched Critical remote code execution vulnerability in Microsoft Windows Remote Desktop Service (RDP). The vulnerability is identified as “CVE-2019-0708 – Remote Desktop Services Remote Code Execution Vulnerability”.

MSRC blog mentions

This vulnerability is pre-authentication and requires no user interaction. In other words, the vulnerability is ‘wormable’, meaning that any future malware that exploits this vulnerability could propagate from one vulnerable computer to another vulnerable computer in a similar way as the WannaCry malware spread across the globe in 2017. While we have observed no exploitation of this vulnerability, it is highly likely that malicious actors will write an exploit for this vulnerability and incorporate it into their malware.

This vulnerability is a special case, as Microsoft went out of the way to patch this vulnerability in Windows 2003 and Windows XP as well, which have reached End of Support quite a long time ago.

Why this vulnerability is so Critical?

  1. It’s a pre-auth vulnerability, meaning it doesn’t require any authentication. Attackers just need network access of vulnerable target to exploit it.
  2. On successful exploitation, attackers can execute any arbitrary code on the target system and eventually take full control of it.
  3. Given the ‘wormable’ nature of this vulnerability, once a host is infected, it can infect other vulnerable hosts in the same network really fast.
  4. Microsoft went out of the way to patch it for older Windows versions, which have reached End of Support already.
  5. The vulnerability can be exploited over RDP port 3389. A simple search on www[.]shodan[.]io shows that there are close to 4 million hosts with RDP port open to Internet.

Fig. 1 – Shodan results showing Hosts with RDP port open to Internet

 

What should you do?

As per the Microsoft advisory and other online sources, this vulnerability is NOT actively getting exploited in the wild at the time of releasing this blog. Still, considering the business risk, we would like to urge users to patch their systems immediately, if they have any of the following affected Windows versions in use:

– Microsoft Windows 7 SP1

– Windows Server 2008 SP2

– Windows Server 2008 R2 – SP1

– Windows XP (All Versions)

– Windows Server 2003 SP2

 

If one cannot apply the Security Updates provided by Microsoft immediately, they should consider disabling the Remote Desktop Services on the vulnerable hosts until official patches are applied.

Our threat research team is actively monitoring this threat and we will keep updating this post accordingly.

 

Content Courtesy:

Pavan Thorat Security Labs

Have something to add to this story? Share it in the comments.

Sushmita Kalashikar
About Sushmita Kalashikar
Sushmita is the content strategist for Quick Heal, with a passion for creative and technical writing. She is also a published author on...
Articles by Sushmita Kalashikar »

No Comments, Be The First!

Your email address will not be published.

CAPTCHA Image