2 “Wormable” Bluekeep Based RCE Bugs in Windows Remote Desktop Services let Hackers Control Your System Remotely

Microsoft released new security updates under Patch Tuesday for August and fixed more than 90 vulnerabilities including 2 Bluekep based “wormable “remote code execution vulnerabilities that reside in the windows remote desktop services.

Same as Bluekeep RDP flaw, newly discovered two RCE vulnerabilities (CVE-2019-1181 and CVE-2019-1182) in remote desktop services are “Wormable” that means attackers propagate the malware from one vulnerable computer to another computer without any user interaction.

Both RCE vulnerabilities are discovered by Microsoft during the internal research, and there is no evidence found that the vulnerabilities are being exploited.

It affected several Windows version including Windows 7 SP1, Windows Server 2008 R2 SP1, Windows Server 2012, Windows 8.1, Windows Server 2012 R2, and all supported versions of Windows 10, including server versions.

Exploit the Windows Remotely without User Interaction

These critical “Wormable” RCE vulnerabilities were found in Remote Desktop Services – formerly known as Terminal Services, and it allows attacker remotely connects the vulnerable systems using RDP and send the specially crafted requests.

Since the vulnerabilities are pre-authenticated, Without any user interaction, an attacker will remotely exploit the vulnerable windows system and execute the arbitrary code remotely.

Also, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

“Affected systems must be patched as quickly as possible because of the elevated risks associated with wormable vulnerabilities are potentially dangerous, and the patch has been released to protect from ‘wormable’ malware or advanced malware threats that could exploit these RCE vulnerabilities.”

Microsoft Security Update for August

Microsoft patch Tuesday security contains fixes of 93 vulnerabilities that affected the various Microsoft product and services.

Out of 93 vulnerabilities, 29 are rated as “Critical Severity” that includes “Wormable” Remote desktop services and a remote code execution flaw in Microsoft Word.

Microsoft patched totally 4 RDS flaws including 2 “Wormable ” (CVE-2019-1181 CVE-2019-1182, CVE-2019-1222, CVE-2019-1226) and all the 4 vulnerabilities can be exploited without authentication or user interaction.

Microsoft fixed the vulnerabilities that reside in the following software

  • Microsoft Windows
  • Internet Explorer
  • Microsoft Edge
  • ChakraCore
  • Microsoft Office and Microsoft Office Services and Web Apps
  • Visual Studio
  • Online Services
  • Active Directory
  • Microsoft Dynamics

Critical RCE bug (CVE-2019-1201) that existing in Microsoft Word due to improper handling of objects in memory let hackers send a specially crafted Word document, and exploit the system without open it.

Another 2 remote code execution vulnerabilities  (CVE-2019-0720 and CVE-2019-0965) are patched that affected Hyper-V and Hyper-V Network Switch allows authenticated user on a guest system to run arbitrary code on the host system.

Microsoft also fixed LNK Remote Code Execution Vulnerability (CVE-2019-1188)that allow an attacker who successfully exploited this vulnerability could gain the same user rights as the local user.

Microsoft strongly recommended installing these security updates for all the windows users to avoid the security risk and protect your Windows.

You can refer the complete patch details for the full list of vulnerabilities resolved, advisories, in the August 2019 Patch here.

If you’re unsure how Patch Tuesday affects you and your organization, then join us this month to discuss with ManageEngine .

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Apollo Router Vulnerability Enables Resource Exhaustion via Optimization Bypass

A critical vulnerability (CVE-2025-32032) has been identified in Apollo Router, a widely used GraphQL federation…

25 minutes ago

WhatsApp for Windows Flaw Allowed Remote Code Execution via File Attachments

A critical vulnerability identified as CVE-2025-30401 was recently disclosed, highlighting a major security flaw in WhatsApp for…

1 hour ago

PoC Exploit Reveals SSH Key Exposure via Yelp Vulnerability on Ubuntu

Security researchers have uncovered a critical vulnerability (CVE-2025-3155) in Ubuntu's default help browser Yelp that…

1 hour ago

Threat Actors Exploit Toll Payment Services in Widespread Hacking Campaign

In a sophisticated cybercrime operation, the Smishing Triad, a China-based group, has been identified as…

11 hours ago

Everest Ransomware Gang’s Leak Site Hacked and Defaced

TechCrunch has uncovered a concerning development in consumer-grade spyware: a stealthy Android monitoring app that…

11 hours ago

ToddyCat Attackers Exploited ESET Command Line Scanner Vulnerability to Conceal Their Tool

In a sophisticated cyberattack, the notorious ToddyCat APT group utilized a previously unknown vulnerability in…

11 hours ago