CERT-In Advisory
CIAD-2019-0023
Microsoft Windows Remote Desktop Services Remote Code Execution Vulnerability (BlueKeep)
Original Issue Date: May 21, 2019
Severity Rating: High
Systems Affected
- Windows XP (all)
- Windows 2003 (all)
- Windows 7 for 32-bit Systems SP 1 and x64-based Systems SP 1
- Windows Server 2008 for 32-bit Systems SP 2 (Server Core installation also affected)
- Windows Server 2008 for Itanium-Based Systems SP 2
- Windows Server 2008 for x64-based Systems SP 2 (Server Core installation also affected)
- Windows Server 2008 R2 for Itanium-Based Systems SP 1
- Windows Server 2008 R2 for x64-based Systems SP 1 (Server Core installation also affected)
- Windows 10 for 32-bit Systems
- Windows 10 for x64-based Systems
- Windows 10 Version 1607 for 32-bit Systems
- Windows 10 Version 1607 for x64-based Systems
- Windows 10 Version 1703 for 32-bit Systems
- Windows 10 Version 1703 for x64-based Systems
- Windows 10 Version 1709 for 32-bit Systems
- Windows 10 Version 1709 for 64-based Systems
- Windows 10 Version 1709 for ARM64-based Systems
- Windows 10 Version 1803 for 32-bit Systems
- Windows 10 Version 1803 for x64-based Systems
- Windows 10 Version 1803 for ARM64-based Systems
- Windows 10 Version 1809 for 32-bit Systems
- Windows 10 Version 1809 for x64-based Systems
- Windows 10 Version 1809 for ARM64-based Systems
- Windows 10 Version 1903 for 32-bit Systems
- Windows 10 Version 1903 for x64-based Systems
- Windows 10 Version 1903 for ARM64-based Systems
- Windows 7 for 32-bit Systems Service Pack 1
- Windows 7 for x64-based Systems Service Pack 1
- Windows 8.1 for 32-bit systems
- Windows 8.1 for x64-based systems
- Windows RT 8.1
- Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
- Windows Server 2008 R2 for x64-based Systems Service Pack 1
- Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
- Windows Server 2012
- Windows Server 2012 (Server Core installation)
- Windows Server 2012 R2
- Windows Server 2012 R2 (Server Core installation)
- Windows Server 2016
- Windows Server 2016 (Server Core installation)
- Windows Server 2019
- Windows Server 2019 (Server Core installation)
- Windows Server, version 1803 (Server Core Installation)
- Windows Server, version 1903 (Server Core installation)
Overview
Three vulnerabilities have been reported in Microsoft Windows Remote Desktop Services which could be exploited by a remote attacker to execute remote code on the targeted system.
Description
These vulnerabilities aka BlueKeep exists in the Microsoft Remote Desktop Services due to improper handling of connection requests. A remote unauthenticated attacker could exploit this vulnerability by sending specially crafted requests to the target systems Remote Desktop Service via RDP.
These vulnerabilities are pre-authentication and does not require any user interaction. Hence, these vulnerabilities could create a worm, which could lead to propagation of any future malware exploiting the vulnerabilities from one computer to another (Similar to Wannacry ransomware).
Successful exploitation of these vulnerabilities could allow the attacker to execute arbitrary code and compromise the target system completely.
Solution
Apply appropriate fix as mentioned in Microsoft Security Advisory
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1182
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1181
Out of Support Windows OSes (Windows XP, Windows 2003): Apply appropriate patches to patch your OS (and strongly recommended to upgrade). Microsoft does not normally give patches for out-of-support OSes but made an exception because of the criticality of the vulnerability.
Vendor Information
Microsoft
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708
https://support.microsoft.com/en-us/help/4500705/customer-guidance-for-cve-2019-0708
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1182
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1181
References
Microsoft
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708
https://support.microsoft.com/en-us/help/4500705/customer-guidance-for-cve-2019-0708
https://blogs.technet.microsoft.com/msrc/2019/05/14/prevent-a-worm-by-updating-remote-desktop-services-cve-2019-0708/
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1182
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1181
Cisco
https://tools.cisco.com/security/center/viewAlert.x?alertId=60195
Trend Micro
https://success.trendmicro.com/solution/000132295-SECURITY-ALERT-Remote-Code-Execution-RCE-Vulnerability-in-Microsoft-Windows-Remote-Desktop-Services-CVE20190708
KrebsonSecurity
https://krebsonsecurity.com/tag/cve-2019-0708/
BleepingComputer
https://www.bleepingcomputer.com/news/security/bluekeep-remote-desktop-exploits-are-coming-patch-now/
CVE Name
CVE-2019-0708
CVE-2019-1181
CVE-2019-1182
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|