CVE-2019-0708:A remote code execution vulnerability exists in Microsoft Windows Remote Desktop Services (RDP) that allows an unauthenticated attacker to connect to the target system and send specially crafted requests, known as the Remote Desktop Services Remote Code Execution Vulnerability (CVE-2019-0708).

splash
Back

Description Preview

A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'.

Overview

CVE-2019-0708, commonly referred to as BlueKeep, is a critical remote code execution flaw in Microsoft Windows Remote Desktop Services that could be exploited over a network by unauthenticated attackers who send crafted RDP requests, potentially allowing full control of affected systems. The issue affects multiple Windows client and server editions listed as affected, including Windows 7 Service Pack 1 (32-bit and x64) and various Windows Server 2008/2008 R2 configurations.

Remediation

  • Apply the Microsoft security updates that fix CVE-2019-0708 to all affected Windows editions (Windows 7 SP1, Windows Server 2008/2008 R2 SP1, including core installations where applicable) via Windows Update, WSUS, or enterprise software deployment tooling.
  • Enable Network Level Authentication (NLA) for Remote Desktop and require authentication before establishing an RDP session.
  • Restrict RDP exposure to trusted networks only: block RDP (port 3389) from the internet at the firewall, or place RDP behind a VPN or Remote Desktop Gateway.
  • If RDP must be accessible, enforce strong authentication (prefer VPN + MFA) and consider enabling additional protections such as RD Gateway and IP allowlists.
  • Disable RDP on systems that do not require it, or isolate unpatched/unsupported hosts from the network until patching is completed.
  • Maintain an ongoing patch management process to ensure all affected systems remain up to date and regularly monitor for exploit attempts and related indicators of compromise.
  • Validate patches in a testing environment before broad deployment and verify successful remediation across all affected endpoints.

References

Early Warning

Customers using Armis Early Warning were notified about this vulnerability before it appeared in CISA's Known Exploited Vulnerabilities Catalog, enabling them to assess their exposure and act proactively. Armis offers these examples of CVEs already included in CISA KEV for potential customers. Click here to learn how to receive alerts earlier.

Armis Alert Date
May 16, 2019
CISA KEV Date
Nov 3, 2021
902days early

Industry ExposureMost to least
This section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.

  1. Manufacturing: Medium
    Manufacturing
  2. Health Care & Social Assistance: Medium
    Health Care & Social Assistance
  3. Public Administration: Low
    Public Administration
  4. Transportation & Warehousing: Low
    Transportation & Warehousing
  5. Retail Trade: Low
    Retail Trade
  6. Arts, Entertainment & Recreation: Low
    Arts, Entertainment & Recreation
  7. Educational Services: Low
    Educational Services
  8. Finance and Insurance: Low
    Finance and Insurance
  9. Other Services (except Public Administration): Low
    Other Services (except Public Administration)
  10. Professional, Scientific, & Technical Services: Low
    Professional, Scientific, & Technical Services
  11. Management of Companies & Enterprises: Low
    Management of Companies & Enterprises
  12. Utilities: Low
    Utilities
  13. Accommodation & Food Services: Low
    Accommodation & Food Services
  14. Administrative, Support, Waste Management & Remediation Services: Low
    Administrative, Support, Waste Management & Remediation Services
  15. Agriculture, Forestry Fishing & Hunting: Low
    Agriculture, Forestry Fishing & Hunting
  16. Construction: Low
    Construction
  17. Information: Low
    Information
  18. Mining: Low
    Mining
  19. Real Estate Rental & Leasing: Low
    Real Estate Rental & Leasing
  20. Wholesale Trade: Low
    Wholesale Trade

Focus on What Matters

  1. See Everything.
  2. Identify True Risk.
  3. Proactively Mitigate Threats.

Let's talk!

background