Remote Desktop Services Remote Code Execution Vulnerability
Description
A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems Remote Desktop Service via RDP. The update addresses the vulnerability by correcting how Remote Desktop Services handles connection requests.
Affected products
5cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*+ 1 more
- cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*range: 10.0.0
- cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*range: 10.0.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- www.huawei.com/en/psirt/security-advisories/huawei-sa-20190819-01-windows-enmitrex_refsource_CONFIRM
- cert-portal.siemens.com/productcert/pdf/ssa-187667.pdfmitrex_refsource_CONFIRM
- portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1226mitrex_refsource_MISC
News mentions
0No linked articles in our index yet.