Sunday, September 8, 2024
HomeExploit2 "Wormable" Bluekeep Based RCE Bugs in Windows Remote Desktop Services let...

2 “Wormable” Bluekeep Based RCE Bugs in Windows Remote Desktop Services let Hackers Control Your System Remotely

Published on

Microsoft released new security updates under Patch Tuesday for August and fixed more than 90 vulnerabilities including 2 Bluekep based “wormable “remote code execution vulnerabilities that reside in the windows remote desktop services.

Same as Bluekeep RDP flaw, newly discovered two RCE vulnerabilities (CVE-2019-1181 and CVE-2019-1182) in remote desktop services are “Wormable” that means attackers propagate the malware from one vulnerable computer to another computer without any user interaction.

Both RCE vulnerabilities are discovered by Microsoft during the internal research, and there is no evidence found that the vulnerabilities are being exploited.

- Advertisement - EHA

It affected several Windows version including Windows 7 SP1, Windows Server 2008 R2 SP1, Windows Server 2012, Windows 8.1, Windows Server 2012 R2, and all supported versions of Windows 10, including server versions.

Exploit the Windows Remotely without User Interaction

These critical “Wormable” RCE vulnerabilities were found in Remote Desktop Services – formerly known as Terminal Services, and it allows attacker remotely connects the vulnerable systems using RDP and send the specially crafted requests.

Since the vulnerabilities are pre-authenticated, Without any user interaction, an attacker will remotely exploit the vulnerable windows system and execute the arbitrary code remotely.

Also, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

“Affected systems must be patched as quickly as possible because of the elevated risks associated with wormable vulnerabilities are potentially dangerous, and the patch has been released to protect from ‘wormable’ malware or advanced malware threats that could exploit these RCE vulnerabilities.”

Microsoft Security Update for August

Microsoft patch Tuesday security contains fixes of 93 vulnerabilities that affected the various Microsoft product and services.

Out of 93 vulnerabilities, 29 are rated as “Critical Severity” that includes “Wormable” Remote desktop services and a remote code execution flaw in Microsoft Word.

Microsoft patched totally 4 RDS flaws including 2 “Wormable ” (CVE-2019-1181 CVE-2019-1182, CVE-2019-1222, CVE-2019-1226) and all the 4 vulnerabilities can be exploited without authentication or user interaction.

Microsoft fixed the vulnerabilities that reside in the following software

  • Microsoft Windows
  • Internet Explorer
  • Microsoft Edge
  • ChakraCore
  • Microsoft Office and Microsoft Office Services and Web Apps
  • Visual Studio
  • Online Services
  • Active Directory
  • Microsoft Dynamics

Critical RCE bug (CVE-2019-1201) that existing in Microsoft Word due to improper handling of objects in memory let hackers send a specially crafted Word document, and exploit the system without open it.

Another 2 remote code execution vulnerabilities  (CVE-2019-0720 and CVE-2019-0965) are patched that affected Hyper-V and Hyper-V Network Switch allows authenticated user on a guest system to run arbitrary code on the host system.

Microsoft also fixed LNK Remote Code Execution Vulnerability (CVE-2019-1188)that allow an attacker who successfully exploited this vulnerability could gain the same user rights as the local user.

Microsoft strongly recommended installing these security updates for all the windows users to avoid the security risk and protect your Windows.

You can refer the complete patch details for the full list of vulnerabilities resolved, advisories, in the August 2019 Patch here.

If you’re unsure how Patch Tuesday affects you and your organization, then join us this month to discuss with ManageEngine .

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

BBTok Abuses Legitimate Windows Utility Command Tool to Stay Undetected

Cybercriminals in Latin America have increased their use of phishing scams targeting business transactions...

Predator Spyware Exploiting “one-click” & “zero-click” Flaws

Recent research indicates that the Predator spyware, once thought to be inactive due to...

Tropic Trooper Attacks Government Organizations to Steal Sensitive Data

Tropic Trooper (aka KeyBoy, Pirate Panda, and APT23) is a sophisticated cyberespionage APT group,...

NoiseAttack is a Novel Backdoor That Uses Power Spectral Density For Evasion

NoiseAttack is a new method of secretly attacking deep learning models. It uses triggers...

Free Webinar

Decoding Compliance | What CISOs Need to Know

Non-compliance can result in substantial financial penalties, with average fines reaching up to $4.5 million for GDPR breaches alone.

Join us for an insightful panel discussion with Chandan Pani, CISO - LTIMindtree and Ashish Tandon, Founder & CEO – Indusface, as we explore the multifaceted role of compliance in securing modern enterprises.

Discussion points

The Role of Compliance
The Alphabet Soup of Compliance
Compliance
SaaS and Compliance
Indusface's Approach to Compliance

More like this

Security Flaw Allows Attackers to Clone YubiKeys by Extract Private Key

Secure elements consist mainly of tiny microcontrollers, which provide service by generating and storing...

PoC Exploit Released For 0-Day Windows Kernel Privilege Escalation Vulnerability

Microsoft released several patches for multiple vulnerabilities during the Patch Tuesday for August 2024....

Microsoft 365 Flags Emails with Images as Malware: A Growing Concern for Users

Microsoft 365 users have reported a troubling issue in which email messages containing images...