Remote Desktop Services Remote Code Execution Vulnerability
Released: Aug 13, 2019
Last updated: Oct 13, 2020
- Assigning CNA
- Microsoft
- CVE.org link
- CVE-2019-1181
- Impact
- Remote Code Execution
- Max Severity
- Critical
- Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
- Metrics
- CVSS:3.1 9.8 / 8.8Base score metrics: 9.8 / Temporal score metrics: 8.8
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Exploit Code Maturity
Proof-of-Concept
Remediation Level
Official Fix
Report Confidence
Confirmed
Please see Common Vulnerability Scoring System for more information on the definition of these metrics.
Executive Summary
A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems Remote Desktop Service via RDP.
The update addresses the vulnerability by correcting how Remote Desktop Services handles connection requests.
Exploitability
The following table provides an exploitability assessment for this vulnerability at the time of original publication.
- Publicly disclosed
- No
- Exploited
- No
- Exploitability assessment
- Exploitation More Likely
Mitigations
The following mitigation may be helpful in your situation. In all cases, Microsoft strongly recommends that you install the updates for this vulnerability as soon as possible even if you plan to leave Remote Desktop Services disabled:
1. Disable Remote Desktop Services if they are not required.
If you no longer need these services on your system, consider disabling them as a security best practice. Disabling unused and unneeded services helps reduce your exposure to security vulnerabilities.
Workarounds
The following workaround may be helpful in your situation. In all cases, Microsoft strongly recommends that you install the updates for this vulnerability as soon as possible even if you plan to leave these workarounds in place:
1. Enable Network Level Authentication (NLA)
You can enable Network Level Authentication to block unauthenticated attackers from exploiting this vulnerability. With NLA turned on, an attacker would first need to authenticate to Remote Desktop Services using a valid account on the target system before the attacker could exploit the vulnerability.
2. Block TCP port 3389 at the enterprise perimeter firewall
TCP port 3389 is used to initiate a connection with the affected component. Blocking this port at the network perimeter firewall will help protect systems that are behind that firewall from attempts to exploit this vulnerability. This can help protect networks from attacks that originate outside the enterprise perimeter. Blocking the affected ports at the enterprise perimeter is the best defense to help avoid Internet-based attacks. However, systems could still be vulnerable to attacks from within their enterprise perimeter.
FAQ
How do I get the update for Microsoft Remote Desktop for IOS?
- Tap the Settings Icon
- Tap the iTunes & App Store
- Turn on AUTOMATIC DOWNLOADS for Apps
Alternatively
- Tap the App Store Icon
- Scroll down to find Microsoft Remote Desktop
- Tap the Update button
I am running Windows 7 Service Pack 1 or Windows Server 2008 R2 Service Pack 1. Is there more information of which I need to be aware?
These operating systems are only affected by this vulnerability if either RDP 8.0 or RDP 8.1 is installed. If you do not have either of these versions of RDP installed on Windows 7 SP1 or Window Server 2008 R2 SP1, then you are not affected by this vulnerability.
How do I get the update for Microsoft Remote Desktop for Android?
- Tap the Google Play icon on your home screen.
- Swipe in from the left edge of the screen.
- Tap My apps & games.
- Tap the Update box next to the Remote Desktop app.
How do I get the update for Microsoft Remote Desktop for Mac?
- Open the Mac app store.
- Search for Microsoft Remote Desktop.
- Download the update. Version 10.4.1 contains the security update that addresses this vulnerability.
Acknowledgements
- Andrew Burkhardt of MSRC Vulnerabilities & Mitigations Team
- Microsoft Platform Security Assurance & Vulnerability Research
Security Updates
To determine the support lifecycle for your software, see the Microsoft Support Lifecycle.
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
Disclaimer
Revisions
Revised the Security Updates table to add Microsoft Remote Desktop for Android, Microsoft Remote Desktop for Mac, and Microsoft Remote Desktop for Mac IoS because these apps are affected by this vulnerability. Microsoft recommends that customers running any of these apps install the latest security update to be fully protected from this vulnerability. Please see the FAQ section for information on how to get these updates.
Information published.