CVE-2019-0708

CRITICAL
2019-05-16 [email protected]
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

5
Analysis Generated
Mar 26, 2026 - 11:18 vuln.today
Patch Released
Oct 29, 2025 - 14:45 nvd
Patch available
PoC Detected
Oct 29, 2025 - 14:45 vuln.today
Public exploit code
Added to CISA KEV
Oct 29, 2025 - 14:45 cisa
CISA KEV
CVE Published
May 16, 2019 - 19:29 nvd
CRITICAL 9.8

Description

A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'.

Analysis

Remote Desktop Services contain a pre-authentication remote code execution vulnerability known as 'BlueKeep' that allows unauthenticated attackers to execute code via crafted RDP requests, with wormable potential rivaling EternalBlue.

Technical Context

The CWE-416 use-after-free in the RDP protocol's channel handling occurs when a crafted connection request triggers improper handling of channel bindings. The vulnerability exists before authentication, meaning any system with RDP exposed can be exploited without credentials. The flaw is in the kernel-mode rdpwd.sys driver, providing SYSTEM-level code execution.

Affected Products

['Microsoft Windows XP', 'Microsoft Windows Server 2003', 'Microsoft Windows Vista SP2', 'Microsoft Windows Server 2008 SP2/R2 SP1', 'Microsoft Windows 7 SP1']

Remediation

Apply Microsoft security update immediately. Enable Network Level Authentication (NLA) as a partial mitigation. Disable RDP where not needed. Use VPN or jump servers for remote access instead of direct RDP exposure. Windows 8+ and Server 2012+ are not affected.

Priority Score

223
Low Medium High Critical
KEV: +50
EPSS: +94.5
CVSS: +49
POC: +20

Share

CVE-2019-0708 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy