Front Page: NCSC-FI
Front Page: NCSC-FI
Menu

Vulnerabilities in Microsoft Remote Desktop app exploited in data breaches

Alert2/2019

Several critical vulnerabilities have been discovered in Remote Desktop Services (RDS, Remote Desktop app) in the Microsoft Windows operating system. These 'wormable' vulnerabilities can be exploited by malware to propagate itself from one vulnerable computer to another automatically. The NCSC-FI has received reports about these vulnerabilities being exploited both in Finland and abroad. There are software updates addressing the vulnerabilities and it is critical to install these updates immediately.

Microsoft has released a set of security updates for RDS. The first software update was released already in May in connection with operating system updates. At that time, the vulnerability patched in RDS was called BlueKeep. Two new critical vulnerabilities in RDS were patched in connection with Microsoft security updates in August. 

When preparing this alert (14 August 2019), there were around 4,500 vulnerable systems open to the internet in Finland. Scanning in preparation for actual vulnerability exploits had increased considerably.

An easy-to-use Metasploit module for penetration testing of systems vulnerable to BlueKeep was published on September 6th, 2019. It is expected that number of exploit attempts will rise considerably.

    Target group of the alert

    • Windows server administrators
    • Organisations using RDS

    Possible solutions and restrictive measures

    • Install software updates
    • Disable RDS
    • Enable Network Level Authentication (NLA)
    • Allow connections from certain sources only

    More Information

    Update history

    Added information about available Metasploit module.

    Alert was discontinued on 8 Oct 2019.