Microsoft Fixes Critical Windows 10 Wormable Remote Desktop Flaws – Digitalmunition

News Microsoft Fixes Critical Windows 10 Wormable Remote Desktop Flaws

Published on August 14th, 2019 📆 | 5533 Views ⚑


Microsoft Fixes Critical Windows 10 Wormable Remote Desktop Flaws

Microsoft Warns Of New Wormable Windows Remote Desktop Flaws

Microsoft released patches for two new critical remote code execution (RCE) vulnerabilities found in the Remote Desktop Services (RDS) and affecting all in-support versions of Windows.

Users are urged to patch by the Microsoft Security Response Center (MSRC) to patch the newly found Windows security flaws as soon as possible due to the elevated risks associated with wormable vulnerabilities.

The two critical RCE flaws are tracked s CVE-2019-1181 and CVE-2019-1182, and just like “the previously-fixed ‘BlueKeep’ vulnerability (CVE-2019-0708), these two vulnerabilities are also ‘wormable’, meaning that any future malware that exploits these could propagate from vulnerable computer to vulnerable computer without user interaction,” adds MSRC Director of Incident Response Simon Pope.

“The affected versions of Windows are Windows 7 SP1, Windows Server 2008 R2 SP1, Windows Server 2012, Windows 8.1, Windows Server 2012 R2, and all supported versions of Windows 10, including server versions,” also adds Pope.

The Remote Desktop Protocol (RDP) is not impacted by the newly patched security flaws, and Windows XP, Windows Server 2003, and Windows Server 2008 are also not affected.

According to the advisories published by Microsoft for the two security issues:

A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

Attackers can exploit the two wormable vulnerabilities by sending specially crafted requests to the Remote Desktop Service of targeted unpatched Windows systems via RDP. 

The security updates issued by Microsoft today address the flaws by “correcting how Remote Desktop Services handles connection requests.”

“These vulnerabilities were discovered by Microsoft during hardening of Remote Desktop Services as part of our continual focus on strengthening the security of our products. At this time, we have no evidence that these vulnerabilities were known to any third party,” further explained Pope.

As a partial mitigation measure, users who cannot immediately patch their systems can protect their systems from the wormable component of the flaws by enabling Network Level Authentication (NLA) “as NLA requires authentication before the vulnerability can be triggered.”

“However, affected systems are still vulnerable to Remote Code Execution (RCE) exploitation if the attacker has valid credentials that can be used to successfully authenticate,” concludes Pope.

BlueKeep was patched three months ago

Microsoft patched a similarly critical RCE vulnerability found in the Remote Desktop Services (RDS) platform—later dubbed BlueKeep and tracked as CVE-2019-0708—on May 14, a security flaw that also allows threat actors to create malware which can propagate between Windows devices running vulnerable RDS installations.

Since then, a scanner module for discovering BlueKeep-vulnerable Windows computers was found by Intezer Labs researchers in a new Watchbog malware variant during late-July.

Security firm Immunity also announced that a fully working BlueKeep RCE exploit has been included within their CANVAS automated pentesting utility with the release of version 7.23, on July 23.

Windows users also received four separate warnings to patch their systems against BlueKeep, one from CISA that followed two others issued by Microsoft [1, 2], and one from the U.S. National Security Agency.

Source link

Tagged with:

Leave a Reply ✍