Unrated severityCISA KEVNVD Advisory· Published May 16, 2019· Updated Oct 21, 2025
CVE-2019-0708
CVE-2019-0708
Description
A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'.
Affected products
2- Microsoft/Windows Serverv5Range: 2008 R2 for x64-based Systems Service Pack 1 (Core installation)
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
14- packetstormsecurity.com/files/153133/Microsoft-Windows-Remote-Desktop-BlueKeep-Denial-Of-Service.htmlmitrex_refsource_MISC
- packetstormsecurity.com/files/153627/Microsoft-Windows-RDP-BlueKeep-Denial-Of-Service.htmlmitrex_refsource_MISC
- packetstormsecurity.com/files/154579/BlueKeep-RDP-Remote-Windows-Kernel-Use-After-Free.htmlmitrex_refsource_MISC
- packetstormsecurity.com/files/155389/Microsoft-Windows-7-x86-BlueKeep-RDP-Use-After-Free.htmlmitrex_refsource_MISC
- packetstormsecurity.com/files/162960/Microsoft-RDP-Remote-Code-Execution.htmlmitrex_refsource_MISC
- www.huawei.com/en/psirt/security-advisories/huawei-sa-20190529-01-windows-enmitrex_refsource_CONFIRM
- www.huawei.com/en/psirt/security-notices/huawei-sn-20190515-01-windows-enmitrex_refsource_CONFIRM
- cert-portal.siemens.com/productcert/pdf/ssa-166360.pdfmitrex_refsource_CONFIRM
- cert-portal.siemens.com/productcert/pdf/ssa-406175.pdfmitrex_refsource_CONFIRM
- cert-portal.siemens.com/productcert/pdf/ssa-433987.pdfmitrex_refsource_CONFIRM
- cert-portal.siemens.com/productcert/pdf/ssa-616199.pdfmitrex_refsource_CONFIRM
- cert-portal.siemens.com/productcert/pdf/ssa-832947.pdfmitrex_refsource_CONFIRM
- cert-portal.siemens.com/productcert/pdf/ssa-932041.pdfmitrex_refsource_CONFIRM
- portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.