{"id":9379,"date":"2019-09-25T02:07:34","date_gmt":"2019-09-25T02:07:34","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=9379"},"modified":"2026-04-17T18:07:51","modified_gmt":"2026-04-17T18:07:51","slug":"windows-remote-desktop-services-remote-code-execution-vulnerability-cve-2019-0708-exploit-disclosure-threat-alert","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/windows-remote-desktop-services-remote-code-execution-vulnerability-cve-2019-0708-exploit-disclosure-threat-alert\/","title":{"rendered":"Windows Remote Desktop Services Remote Code Execution Vulnerability (CVE-2019-0708) Exploit Disclosure Threat Alert"},"content":{"rendered":"<p><!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\"><br \/>\n<html><body><\/p>\n<ol>\n<li>\n<h2><strong>Exploit Disclosure<\/strong><\/h2>\n<\/li>\n<\/ol>\n<p><strong>In the early morning of September 7, Beijing time, a developer disclosed a Metasploit exploit module for the Windows remote desktop services remote code execution vulnerability (CVE-2019-0708) on GitHub. The initial public exploit module (BlueKeep) for the CVE-2019-0708 vulnerability could cause old versions of Windows (Windows 7 SP1 x64 and Windows 2008 R2 x64) to execute code remotely without user interaction. This vulnerability, like WannaCry, will propagate widely, having constituted security threats in the wild. <\/strong><\/p>\n<p><strong>&Acirc;&nbsp;<a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0925-2.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-9381\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0925-2.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"531\" height=\"409\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0925-2.jpg 531w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0925-2-300x231.jpg 300w\" sizes=\"(max-width: 531px) 100vw, 531px\" \/><\/a><\/strong><!--more--><\/p>\n<p>The test shows that this exploit can be successfully used. By default, the BlueKeep module of Metasploit only checks whether the target and its operating system version are vulnerable. Currently, instead of launching attacks automatically, this exploit <strong>requires users to manually configure target details<\/strong> prior to further exploitation. If the module does not provide proper configuration parameters during exploitation, this could lead to the blue screen of death (BSoD) to the target host. Currently, hackers have scanned vulnerable devices on a large scale, possibly hitting vulnerable hosts in batches. <strong>Therefore, users are strongly recommended to check their assets and immediately download patches for affected devices or take other measures to avoid related threats. <\/strong><\/p>\n<p>Reference links:<\/p>\n<p>https:\/\/github.com\/rapid7\/metasploit-framework\/pull\/12283?from=timeline&#038;isappinstalled=0<\/p>\n<p>https:\/\/github.com\/rapid7\/metasploit-framework\/pull\/12283\/files<\/p>\n<ol start=\"2\">\n<li>\n<h2><strong>Vulnerability Description<\/strong><\/h2>\n<\/li>\n<\/ol>\n<p>On April 15, Beijing time, Microsoft released May 2019 security patches that fix 82 vulnerabilities, among which the Windows operating system remote desktop services vulnerability (CVE-2019-0708) poses serious threats. Attackers could exploit this vulnerability to cause remote code execution or worm attacks by sending a malicious request to the target via the RDP protocol.<\/p>\n<p>Considering the high risk level of this vulnerability, Microsoft has also released security updates to fix this vulnerability in versions for which official support is no longer available to fix this vulnerability. Currently, the exploit of this vulnerability has been made public, and therefore affected users are advised to download and install patches as soon as possible.<\/p>\n<p>Reference links:<\/p>\n<p><a href=\"https:\/\/support.microsoft.com\/en-ca\/help\/4500705\/customer-guidance-for-cve-2019-0708\">https:\/\/support.microsoft.com\/en-ca\/help\/4500705\/customer-guidance-for-cve-2019-0708<\/a><\/p>\n<p>https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0708<\/p>\n<ol start=\"3\">\n<li>\n<h2><strong>Scope of Impact<\/strong><\/h2>\n<\/li>\n<\/ol>\n<p><strong>Affected Versions<\/strong><\/p>\n<ul>\n<li>Windows 7 for 32-bit Systems Service Pack 1<\/li>\n<li>Windows 7 for x64-based Systems Service Pack1<\/li>\n<li>Windows Server 2008 for 32-bit SystemsService Pack 2<\/li>\n<li>Windows Server 2008 for 32-bit SystemsService Pack 2 (Server Core installation)<\/li>\n<li>Windows Server 2008 for Itanium-Based SystemsService Pack 2<\/li>\n<li>Windows Server 2008 for x64-based SystemsService Pack 2<\/li>\n<li>Windows Server 2008 for x64-based SystemsService Pack 2 (Server Core installation)<\/li>\n<li>Windows Server 2008 R2 for Itanium-BasedSystems Service Pack 1<\/li>\n<li>Windows Server 2008 R2 for x64-based SystemsService Pack 1<\/li>\n<li>Windows Server 2008 R2 for x64-based SystemsService Pack 1 (Server Core installation)<\/li>\n<li>Windows Server 2003 SP2 x86 (official support no longer available)<\/li>\n<li>Windows Server 2003 x64 Edition SP2 (official support no longer available)<\/li>\n<li>Windows XP SP3 x86 (official support no longer available)<\/li>\n<li>Windows XP Professional x64 Edition SP2 (official support no longer available)<\/li>\n<li>Windows XP Embedded SP3 x86 (official support no longer available)<\/li>\n<\/ul>\n<p><strong>Unaffected Versions<\/strong><\/p>\n<ul>\n<li>Windows 8<\/li>\n<li>Windows 10<\/li>\n<\/ul>\n<ol start=\"4\">\n<li>\n<h2><strong>Vulnerability Detection<\/strong><\/h2>\n<ul>\n<li>\n<h3><strong>Online Detection<\/strong><\/h3>\n<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p>NSFOCUS Cloud provides an entry for online detection. Enterprise users can check whether their assets are vulnerable by visiting NSFOCUS Cloud.<\/p>\n<ul>\n<li>For a mobile device:<\/li>\n<\/ul>\n<p>https:\/\/cloud.nsfocus.com\/megi\/holes\/hole_WindowsRDP_2019_5_15.html<\/p>\n<ul>\n<li>For a PC:<\/li>\n<\/ul>\n<p>https:\/\/cloud.nsfocus.com\/#\/secwarning\/secwarning_news<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0925-3.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-9382\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0925-3.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"531\" height=\"338\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0925-3.jpg 531w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0925-3-300x191.jpg 300w\" sizes=\"(max-width: 531px) 100vw, 531px\" \/><\/a><\/p>\n<ul>\n<li>\n<h3><strong>Check by Our Product<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p>NSFOCUS Remote Security Assessment System (RSAS) has provided thorough scan rules for this vulnerability. The following table lists rule upgrade package details.<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"158\"><strong>&Acirc;&nbsp;<\/strong><\/td>\n<td width=\"104\"><strong>Version<\/strong><\/td>\n<td width=\"319\"><strong>Upgrade Package Download Link<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"158\"><strong>RSAS V6 system plug-in package<\/strong><\/td>\n<td width=\"104\">V6.0R02F01.1411<\/td>\n<td width=\"319\">http:\/\/update.nsfocus.com\/update\/downloads\/id\/28802<\/td>\n<\/tr>\n<tr>\n<td width=\"158\"><strong>RSAS V5 system plug-in package<\/strong><\/td>\n<td width=\"104\">051840<\/td>\n<td width=\"319\">http:\/\/update.nsfocus.com\/update\/downloads\/id\/28822<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>For how to configure NSFOCUS RSAS, click the following link:<\/p>\n<p>https:\/\/mp.weixin.qq.com\/s\/aLAWXs5DgRhNHf4WHHhQyg<\/p>\n<ol start=\"5\">\n<li>\n<h2><strong>Mitigation<\/strong><\/h2>\n<ul>\n<li>\n<h3><strong>Protection with Security Products<\/strong><\/h3>\n<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p>To defend against this vulnerability, NSFOCUS has released rule upgrade packages for its security products. Users are strongly recommended to upgrade to the latest rule to ensure that these security products can effectively protect against this vulnerability. The following table lists rule base versions of NSFOCUS security products.<\/p>\n<table width=\"581\">\n<tbody>\n<tr>\n<td width=\"121\"><strong>Product<\/strong><\/td>\n<td width=\"113\"><strong>Rule Base Version<\/strong><\/td>\n<td width=\"262\"><strong>Upgrade Package Download Link<\/strong><\/td>\n<td width=\"85\"><strong>Rule ID<\/strong><\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\" width=\"121\"><strong>NIPS<\/strong><\/td>\n<td width=\"113\">5.6.10.20340<\/td>\n<td width=\"262\">http:\/\/update.nsfocus.com\/update\/downloads\/id\/28804<\/td>\n<td rowspan=\"4\" width=\"85\">[24489]<\/td>\n<\/tr>\n<tr>\n<td width=\"113\">5.6.9.20340<\/td>\n<td width=\"262\">http:\/\/update.nsfocus.com\/update\/downloads\/id\/28803<\/td>\n<\/tr>\n<tr>\n<td width=\"113\">5.6.8.778<\/td>\n<td width=\"262\">http:\/\/update.nsfocus.com\/update\/downloads\/id\/28794<\/td>\n<\/tr>\n<tr>\n<td width=\"121\"><strong>NF<\/strong><\/td>\n<td width=\"113\">6.0.1.778<\/td>\n<td width=\"262\">http:\/\/update.nsfocus.com\/update\/downloads\/id\/28828<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>For how to upgrade product rules, click the following links:<\/p>\n<p>NIPS: https:\/\/mp.weixin.qq.com\/s\/JsRktENQNj1TdZSU62N0Ww<\/p>\n<p>NF: <a href=\"https:\/\/mp.weixin.qq.com\/s\/bggqcm9VqHiPnfV1XoNuDQ\">https:\/\/mp.weixin.qq.com\/s\/bggqcm9VqHiPnfV1XoNuDQ<\/a><\/p>\n<ul>\n<li>\n<h3><strong><a name=\"_Toc130115382\"><\/a> Official Patches<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p>Microsoft has released security updates for all affected products (including versions for which official support is no longer available) to fix these vulnerabilities. Affected users are advised to download and install them as soon as possible. There are three methods to obtain and install patches: intranet WSUS, Microsoft Update service available on Microsoft&#8217;s official website, and offline installation.<\/p>\n<p>Note: To immediately start Windows Update, users can type <strong>wuauclt.exe \/detectnow<\/strong> at the command line prompt.<\/p>\n<p><strong>Method 1: intranet WSUS<\/strong><\/p>\n<p>Applicability: This method is applicable to computers that are in the Active Directory domain where the WSUS server is available, or computers that have access to the intranet WSUS service.<\/p>\n<p>The system automatically downloads new security patches in a regular manner and prompts users to install them. What users need to do is install these patches as prompted.<\/p>\n<p>To make a patch take effect immediately, users can restart their computers as soon as the installation is complete.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Method 2: Microsoft Update service available on Microsoft&#8217;s official website<\/strong><\/p>\n<p>Applicability: This method is applicable to computers that can connect to the Internet, but have no access to the intranet WSUS service, including those with the intranet WSUS service disabled and those that have this service enabled, but have no access to the intranet.<\/p>\n<p>If the intranet WSUS service is not enabled on computers, users should first enable it and then install patches and restart the computer as prompted.<\/p>\n<p>If computers have the intranet WSUS service enabled, but do not connect to the intranet, users should do as follows: Choose <strong>Start &gt; All Programs &gt; Windows Update<\/strong>, click <strong>Check online for updates from Microsoft Update<\/strong>, and then do as prompted.<\/p>\n<p><strong>Method 3: offline installation<\/strong><\/p>\n<p>With this method, users need to first download the latest patch for the current system, and then double-click the installation package to install it. For download links, see appendix A &#8220;Official Patch Download Link.&#8221;<\/p>\n<ul>\n<li>\n<h3><strong>Workarounds<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p>If users cannot install patches for the time being, they can adopt the following temporary measures to protect against these vulnerabilities:<\/p>\n<ul>\n<li>If RDP is unnecessary, disable the service.<\/li>\n<li>Configure the host firewall to block the TCP port (3389 by default) of RDP.<\/li>\n<li>Enable network-level authentication (NLA). This is applicable to Windows 7, Windows Server 2008, and Windows Server 2008 R2.<\/li>\n<\/ul>\n<p>Appendix A Official Patch Download Link<\/p>\n<table width=\"591\">\n<tbody>\n<tr>\n<td width=\"177\">OS Version<\/td>\n<td width=\"413\">Patch Download Link<\/td>\n<\/tr>\n<tr>\n<td width=\"177\">Windows 7 x86<\/td>\n<td width=\"413\"><a href=\"http:\/\/download.windowsupdate.com\/d\/msdownload\/update\/software\/secu\/2019\/05\/windows6.1-kb4499175-x86_6f1319c32d5bc4caf2058ae8ff40789ab10bf41b.msu\">http:\/\/download.windowsupdate.com\/d\/msdownload\/update\/software\/secu\/2019\/05\/windows6.1-kb4499175-x86_6f1319c32d5bc4caf2058ae8ff40789ab10bf41b.msu<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"177\">Windows 7 x64<\/td>\n<td width=\"413\"><a href=\"http:\/\/download.windowsupdate.com\/d\/msdownload\/update\/software\/secu\/2019\/05\/windows6.1-kb4499175-x64_3704acfff45ddf163d8049683d5a3b75e49b58cb.msu\">http:\/\/download.windowsupdate.com\/d\/msdownload\/update\/software\/secu\/2019\/05\/windows6.1-kb4499175-x64_3704acfff45ddf163d8049683d5a3b75e49b58cb.msu<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"177\">Windows Embedded Standard 7 for x64<\/td>\n<td width=\"413\"><a href=\"http:\/\/download.windowsupdate.com\/d\/msdownload\/update\/software\/secu\/2019\/05\/windows6.1-kb4499175-x64_3704acfff45ddf163d8049683d5a3b75e49b58cb.msu\">http:\/\/download.windowsupdate.com\/d\/msdownload\/update\/software\/secu\/2019\/05\/windows6.1-kb4499175-x64_3704acfff45ddf163d8049683d5a3b75e49b58cb.msu<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"177\">Windows Embedded Standard 7 for x86<\/td>\n<td width=\"413\"><a href=\"http:\/\/download.windowsupdate.com\/d\/msdownload\/update\/software\/secu\/2019\/05\/windows6.1-kb4499175-x86_6f1319c32d5bc4caf2058ae8ff40789ab10bf41b.msu\">http:\/\/download.windowsupdate.com\/d\/msdownload\/update\/software\/secu\/2019\/05\/windows6.1-kb4499175-x86_6f1319c32d5bc4caf2058ae8ff40789ab10bf41b.msu<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"177\">Windows Server 2008 x64<\/td>\n<td width=\"413\"><a href=\"http:\/\/download.windowsupdate.com\/d\/msdownload\/update\/software\/secu\/2019\/05\/windows6.0-kb4499149-x64_9236b098f7cea864f7638e7d4b77aa8f81f70fd6.msu\">http:\/\/download.windowsupdate.com\/d\/msdownload\/update\/software\/secu\/2019\/05\/windows6.0-kb4499149-x64_9236b098f7cea864f7638e7d4b77aa8f81f70fd6.msu<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"177\">Windows Server 2008 Itanium<\/td>\n<td width=\"413\">http:\/\/download.windowsupdate.com\/d\/msdownload\/update\/software\/secu\/2019\/05\/windows6.0-kb4499180-ia64_805e448d48ab8b1401377ab9845f39e1cae836d4.msu<\/td>\n<\/tr>\n<tr>\n<td width=\"177\">Windows Server 2008 x86<\/td>\n<td width=\"413\"><a href=\"http:\/\/download.windowsupdate.com\/d\/msdownload\/update\/software\/secu\/2019\/05\/windows6.0-kb4499149-x86_832cf179b302b861c83f2a92acc5e2a152405377.msu\">http:\/\/download.windowsupdate.com\/d\/msdownload\/update\/software\/secu\/2019\/05\/windows6.0-kb4499149-x86_832cf179b302b861c83f2a92acc5e2a152405377.msu<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"177\">Windows Server 2008 R2 Itanium<\/td>\n<td width=\"413\"><a href=\"http:\/\/download.windowsupdate.com\/c\/msdownload\/update\/software\/secu\/2019\/05\/windows6.1-kb4499175-ia64_fabc8e54caa0d31a5abe8a0b347ab4a77aa98c36.msu\">http:\/\/download.windowsupdate.com\/c\/msdownload\/update\/software\/secu\/2019\/05\/windows6.1-kb4499175-ia64_fabc8e54caa0d31a5abe8a0b347ab4a77aa98c36.msu<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"177\">Windows Server 2008 R2 x64<\/td>\n<td width=\"413\"><a href=\"http:\/\/download.windowsupdate.com\/d\/msdownload\/update\/software\/secu\/2019\/05\/windows6.1-kb4499175-x64_3704acfff45ddf163d8049683d5a3b75e49b58cb.msu\">http:\/\/download.windowsupdate.com\/d\/msdownload\/update\/software\/secu\/2019\/05\/windows6.1-kb4499175-x64_3704acfff45ddf163d8049683d5a3b75e49b58cb.msu<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"177\">Windows Server 2003 x86<\/td>\n<td width=\"413\"><a href=\"http:\/\/download.windowsupdate.com\/d\/csa\/csa\/secu\/2019\/04\/windowsserver2003-kb4500331-x86-custom-chs_4892823f525d9d532ed3ae36fc440338d2b46a72.exe\">http:\/\/download.windowsupdate.com\/d\/csa\/csa\/secu\/2019\/04\/windowsserver2003-kb4500331-x86-custom-chs_4892823f525d9d532ed3ae36fc440338d2b46a72.exe<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"177\">Windows Server 2003 x64<\/td>\n<td width=\"413\"><a href=\"http:\/\/download.windowsupdate.com\/d\/csa\/csa\/secu\/2019\/04\/windowsserver2003-kb4500331-x64-custom-chs_f2f949a9a764ff93ea13095a0aca1fc507320d3c.exe\">http:\/\/download.windowsupdate.com\/d\/csa\/csa\/secu\/2019\/04\/windowsserver2003-kb4500331-x64-custom-chs_f2f949a9a764ff93ea13095a0aca1fc507320d3c.exe<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"177\">Windows XP SP3<\/td>\n<td width=\"413\"><a href=\"http:\/\/download.windowsupdate.com\/c\/csa\/csa\/secu\/2019\/04\/windowsxp-kb4500331-x86-custom-chs_718543e86e06b08b568826ac13c05f967392238c.exe\">http:\/\/download.windowsupdate.com\/c\/csa\/csa\/secu\/2019\/04\/windowsxp-kb4500331-x86-custom-chs_718543e86e06b08b568826ac13c05f967392238c.exe<\/a><\/td>\n<\/tr>\n<tr>\n<td width=\"177\">Windows XP SP2 for x64<\/td>\n<td width=\"413\">http:\/\/download.windowsupdate.com\/d\/csa\/csa\/secu\/2019\/04\/windowsserver2003-kb4500331-x64-custom-enu_e2fd240c402134839cfa22227b11a5ec80ddafcf.exe<\/td>\n<\/tr>\n<tr>\n<td width=\"177\">Windows XP SP3 for XPe<\/td>\n<td width=\"413\">http:\/\/download.windowsupdate.com\/d\/csa\/csa\/secu\/2019\/04\/windowsxp-kb4500331-x86-embedded-custom-chs_96da48aaa9d9bcfe6cd820f239db2fe96500bfae.exe<\/td>\n<\/tr>\n<tr>\n<td width=\"177\">WES09 and POSReady 2009<\/td>\n<td width=\"413\">http:\/\/download.windowsupdate.com\/d\/msdownload\/update\/software\/secu\/2019\/04\/windowsxp-kb4500331-x86-embedded-chs_e3fceca22313ca5cdda811f49a606a6632b51c1c.exe<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><strong>Statement<\/strong><\/h2>\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n<h2><strong>About NSFOCUS<\/strong><\/h2>\n<p>NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. The company&#8217;s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide multi-layered, unified and dynamic protection against advanced cyber attacks.<\/p>\n<p>NSFOCUS works with Fortune Global 500 companies, including four of the world&#8217;s five largest financial institutions, organizations in insurance, retail, healthcare, critical infrastructure industries as well as government agencies. NSFOCUS has technology and channel partners in more than 60 countries, is a member of both the Microsoft Active Protections Program (MAPP), and the Cloud Security Alliance (CSA).<\/p>\n<p>A wholly owned subsidiary of NSFOCUS Information Technology Co. Ltd., the company has operations in the Americas, Europe, the Middle East and Asia Pacific.<\/body><\/html><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Exploit Disclosure In the early morning of September 7, Beijing time, a developer disclosed a Metasploit exploit module for the Windows remote desktop services remote code execution vulnerability (CVE-2019-0708) on GitHub. The initial public exploit module (BlueKeep) for the CVE-2019-0708 vulnerability could cause old versions of Windows (Windows 7 SP1 x64 and Windows 2008 R2 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":9380,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[6],"tags":[758],"class_list":["post-9379","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-emergency-response","tag-windows-vulnerability"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Windows Remote Desktop Services Remote Code Execution Vulnerability (CVE-2019-0708) Exploit Disclosure Threat Alert - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Windows Remote Desktop Services Remote Code Execution Vulnerability (CVE-2019-0708) Exploit Disclosure Threat Alert - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Exploit Disclosure In the early morning of September 7, Beijing time, a developer disclosed a Metasploit exploit module for the Windows remote desktop\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/windows-remote-desktop-services-remote-code-execution-vulnerability-cve-2019-0708-exploit-disclosure-threat-alert\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-25T02:07:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0925-1.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Windows Remote Desktop Services Remote Code Execution Vulnerability (CVE-2019-0708) Exploit Disclosure Threat Alert - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Exploit Disclosure In the early morning of September 7, Beijing time, a developer disclosed a Metasploit exploit module for the Windows remote desktop\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0925-1.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/windows-remote-desktop-services-remote-code-execution-vulnerability-cve-2019-0708-exploit-disclosure-threat-alert\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/windows-remote-desktop-services-remote-code-execution-vulnerability-cve-2019-0708-exploit-disclosure-threat-alert\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Windows Remote Desktop Services Remote Code Execution Vulnerability (CVE-2019-0708) Exploit Disclosure Threat Alert\",\"datePublished\":\"2019-09-25T02:07:34+00:00\",\"dateModified\":\"2026-04-17T18:07:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/windows-remote-desktop-services-remote-code-execution-vulnerability-cve-2019-0708-exploit-disclosure-threat-alert\\\/\"},\"wordCount\":1742,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/windows-remote-desktop-services-remote-code-execution-vulnerability-cve-2019-0708-exploit-disclosure-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/0925-1.jpg\",\"keywords\":[\"Windows Vulnerability\"],\"articleSection\":[\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/windows-remote-desktop-services-remote-code-execution-vulnerability-cve-2019-0708-exploit-disclosure-threat-alert\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/windows-remote-desktop-services-remote-code-execution-vulnerability-cve-2019-0708-exploit-disclosure-threat-alert\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/windows-remote-desktop-services-remote-code-execution-vulnerability-cve-2019-0708-exploit-disclosure-threat-alert\\\/\",\"name\":\"Windows Remote Desktop Services Remote Code Execution Vulnerability (CVE-2019-0708) Exploit Disclosure Threat Alert - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/windows-remote-desktop-services-remote-code-execution-vulnerability-cve-2019-0708-exploit-disclosure-threat-alert\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/windows-remote-desktop-services-remote-code-execution-vulnerability-cve-2019-0708-exploit-disclosure-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/0925-1.jpg\",\"datePublished\":\"2019-09-25T02:07:34+00:00\",\"dateModified\":\"2026-04-17T18:07:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/windows-remote-desktop-services-remote-code-execution-vulnerability-cve-2019-0708-exploit-disclosure-threat-alert\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/windows-remote-desktop-services-remote-code-execution-vulnerability-cve-2019-0708-exploit-disclosure-threat-alert\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/windows-remote-desktop-services-remote-code-execution-vulnerability-cve-2019-0708-exploit-disclosure-threat-alert\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/0925-1.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/0925-1.jpg\",\"width\":554,\"height\":296,\"caption\":\"Blue Windows logo with light beams.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/windows-remote-desktop-services-remote-code-execution-vulnerability-cve-2019-0708-exploit-disclosure-threat-alert\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Windows Remote Desktop Services Remote Code Execution Vulnerability (CVE-2019-0708) Exploit Disclosure Threat Alert\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Windows Remote Desktop Services Remote Code Execution Vulnerability (CVE-2019-0708) Exploit Disclosure Threat Alert - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Windows Remote Desktop Services Remote Code Execution Vulnerability (CVE-2019-0708) Exploit Disclosure Threat Alert - NSFOCUS","og_description":"Exploit Disclosure In the early morning of September 7, Beijing time, a developer disclosed a Metasploit exploit module for the Windows remote desktop","og_url":"https:\/\/nsfocusglobal.com\/windows-remote-desktop-services-remote-code-execution-vulnerability-cve-2019-0708-exploit-disclosure-threat-alert\/","og_site_name":"NSFOCUS","article_published_time":"2019-09-25T02:07:34+00:00","article_modified_time":"2026-04-17T18:07:51+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0925-1.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Windows Remote Desktop Services Remote Code Execution Vulnerability (CVE-2019-0708) Exploit Disclosure Threat Alert - NSFOCUS","twitter_description":"Exploit Disclosure In the early morning of September 7, Beijing time, a developer disclosed a Metasploit exploit module for the Windows remote desktop","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0925-1.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"9 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/windows-remote-desktop-services-remote-code-execution-vulnerability-cve-2019-0708-exploit-disclosure-threat-alert\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/windows-remote-desktop-services-remote-code-execution-vulnerability-cve-2019-0708-exploit-disclosure-threat-alert\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Windows Remote Desktop Services Remote Code Execution Vulnerability (CVE-2019-0708) Exploit Disclosure Threat Alert","datePublished":"2019-09-25T02:07:34+00:00","dateModified":"2026-04-17T18:07:51+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/windows-remote-desktop-services-remote-code-execution-vulnerability-cve-2019-0708-exploit-disclosure-threat-alert\/"},"wordCount":1742,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/windows-remote-desktop-services-remote-code-execution-vulnerability-cve-2019-0708-exploit-disclosure-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0925-1.jpg","keywords":["Windows Vulnerability"],"articleSection":["Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/windows-remote-desktop-services-remote-code-execution-vulnerability-cve-2019-0708-exploit-disclosure-threat-alert\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/windows-remote-desktop-services-remote-code-execution-vulnerability-cve-2019-0708-exploit-disclosure-threat-alert\/","url":"https:\/\/nsfocusglobal.com\/windows-remote-desktop-services-remote-code-execution-vulnerability-cve-2019-0708-exploit-disclosure-threat-alert\/","name":"Windows Remote Desktop Services Remote Code Execution Vulnerability (CVE-2019-0708) Exploit Disclosure Threat Alert - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/windows-remote-desktop-services-remote-code-execution-vulnerability-cve-2019-0708-exploit-disclosure-threat-alert\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/windows-remote-desktop-services-remote-code-execution-vulnerability-cve-2019-0708-exploit-disclosure-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0925-1.jpg","datePublished":"2019-09-25T02:07:34+00:00","dateModified":"2026-04-17T18:07:51+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/windows-remote-desktop-services-remote-code-execution-vulnerability-cve-2019-0708-exploit-disclosure-threat-alert\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/windows-remote-desktop-services-remote-code-execution-vulnerability-cve-2019-0708-exploit-disclosure-threat-alert\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/windows-remote-desktop-services-remote-code-execution-vulnerability-cve-2019-0708-exploit-disclosure-threat-alert\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0925-1.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/09\/0925-1.jpg","width":554,"height":296,"caption":"Blue Windows logo with light beams."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/windows-remote-desktop-services-remote-code-execution-vulnerability-cve-2019-0708-exploit-disclosure-threat-alert\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Windows Remote Desktop Services Remote Code Execution Vulnerability (CVE-2019-0708) Exploit Disclosure Threat Alert"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/9379","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=9379"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/9379\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/9380"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=9379"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=9379"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=9379"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}