Lucene search

K
cve[email protected]CVE-2019-0708
HistoryMay 16, 2019 - 7:29 p.m.

CVE-2019-0708

2019-05-1619:29:00
CWE-416
web.nvd.nist.gov
2787
In Wild
36
42
security
vulnerability
code execution
remote desktop services
rdp
nvd
cve-2019-0708

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

0.975 High

EPSS

Percentile

100.0%

A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka ‘Remote Desktop Services Remote Code Execution Vulnerability’.

Affected configurations

Vulners
NVD
Node
microsoftwindows
OR
microsoftwindows
OR
microsoftwindows_server
OR
microsoftwindows_server
OR
microsoftwindows_server
OR
microsoftwindows_server
OR
microsoftwindows_server
OR
microsoftwindows_server
OR
microsoftwindows_server
OR
microsoftwindows_server
VendorProductVersionCPE
microsoftwindows*cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
microsoftwindows*cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
microsoftwindows_server*cpe:2.3:o:microsoft:windows_server:*:*:*:*:*:*:*:*
microsoftwindows_server*cpe:2.3:o:microsoft:windows_server:*:*:*:*:*:*:*:*
microsoftwindows_server*cpe:2.3:o:microsoft:windows_server:*:*:*:*:*:*:*:*
microsoftwindows_server*cpe:2.3:o:microsoft:windows_server:*:*:*:*:*:*:*:*
microsoftwindows_server*cpe:2.3:o:microsoft:windows_server:*:*:*:*:*:*:*:*
microsoftwindows_server*cpe:2.3:o:microsoft:windows_server:*:*:*:*:*:*:*:*
microsoftwindows_server*cpe:2.3:o:microsoft:windows_server:*:*:*:*:*:*:*:*
microsoftwindows_server*cpe:2.3:o:microsoft:windows_server:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Windows",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "7 for 32-bit Systems Service Pack 1"
      },
      {
        "status": "affected",
        "version": "7 for x64-based Systems Service Pack 1"
      }
    ]
  },
  {
    "product": "Windows Server",
    "vendor": "Microsoft",
    "versions": [
      {
        "status": "affected",
        "version": "2008 R2 for x64-based Systems Service Pack 1 (Core installation)"
      },
      {
        "status": "affected",
        "version": "2008 R2 for Itanium-Based Systems Service Pack 1"
      },
      {
        "status": "affected",
        "version": "2008 R2 for x64-based Systems Service Pack 1"
      },
      {
        "status": "affected",
        "version": "2008 for 32-bit Systems Service Pack 2 (Core installation)"
      },
      {
        "status": "affected",
        "version": "2008 for Itanium-Based Systems Service Pack 2"
      },
      {
        "status": "affected",
        "version": "2008 for 32-bit Systems Service Pack 2"
      },
      {
        "status": "affected",
        "version": "2008 for x64-based Systems Service Pack 2"
      },
      {
        "status": "affected",
        "version": "2008 for x64-based Systems Service Pack 2 (Core installation)"
      }
    ]
  }
]

References

Social References

More

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

0.975 High

EPSS

Percentile

100.0%