[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":17,"vulnerability-4914":24},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},["Island",18],{"key":19,"params":20,"result":22},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":21},"{\"text-color\":\"gray\"}",{"head":23},{},{"id":25,"detectable_with":26,"vuln_details":33,"vuln_id":61,"name":62,"published":63,"updated":34},4914,{"tool":27,"engine":30},{"id":28,"name":29},1,"Network Scanner",{"id":31,"name":32},3,"OpenVAS",{"id":25,"codename":34,"description":34,"severity":35,"risk_description":36,"public_description":37,"public_recommendation":38,"recommendation":34,"references":39,"cvssv3":54,"epss_score":55,"epss_percentile":56,"cve":57,"in_cisa_catalog":59,"date":60,"software_type":34,"vendor":34,"product":34,"ptt_exploit_capabilities":34},null,"critical","A remote code execution vulnerability exists in Remote Desktop Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. For an in-depth analysis and further technical insights and details please see the references. Successful exploitation would allow an attacker to execute arbitrary code on the target system. An attacker could then install programs, view, change, or delete data, or create new accounts with full user rights.","Microsoft Windows Remote Desktop Services is prone to a remote code execution (RCE) vulnerability dubbed BlueKeep.","The vendor has released updates. Please see the references for more information. As a workaround enable Network Level Authentication (NLA) on systems running supported editions of Windows 7, Windows Server 2008, and Windows Server 2008 R2. NOTE: After enabling NLA affected systems are still vulnerable to Remote Code Execution (RCE) exploitation if the attacker has valid credentials that can be used to successfully authenticate.",[40,41,42,43,44,45,46,47,48,49,50,51,52,53],"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708","https://support.microsoft.com/help/4499164","https://support.microsoft.com/help/4499175","https://support.microsoft.com/help/4499149","https://support.microsoft.com/help/4499180","https://support.microsoft.com/help/4500331","https://blogs.technet.microsoft.com/msrc/2019/05/14/prevent-a-worm-by-updating-remote-desktop-services-cve-2019-0708/","https://support.microsoft.com/en-us/help/4500705/customer-guidance-for-cve-2019-0708","https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc732713(v=ws.11)","http://www.securityfocus.com/bid/108273","http://packetstormsecurity.com/files/153133/Microsoft-Windows-Remote-Desktop-BlueKeep-Denial-Of-Service.html","https://www.malwaretech.com/2019/05/analysis-of-cve-2019-0708-bluekeep.html","https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/rdp-stands-for-really-do-patch-understanding-the-wormable-rdp-vulnerability-cve-2019-0708","https://www.cisa.gov/known-exploited-vulnerabilities-catalog",9.8,0.94454,0.99992,[58],"CVE-2019-0708",true,"2019-05-16T00:00:00Z","NETSCAN-OPENVAS-1.3.6.1.4.1.25623.1.0.108611","Microsoft Windows Remote Desktop Services RCE Vulnerability (CVE-2019-0708, BlueKeep) - Active Check","2019-07-05T00:00:00Z"]