
长按二维码关注
御见威胁情报中心
针对远程桌面服务的新高危漏洞(CVE-2019-1181 / 1182)
漏洞描述:
今天,微软发布了一套针对远程桌面服务的新修复程序,其中包括两个关键的远程执行代码(RCE)漏洞, CVE-2019-1181和CVE-2019-1182。与之前修复的“BlueKeep”漏洞(CVE-2019-0708)一样,任何利用这些漏洞的恶意软件都可能从易受攻击的计算机传播到易受攻击的计算机而无需用户交互。
这是微软在研究“BlueKeep”漏洞(CVE-2019-0708) 原理的时候,对rds进行梳理后自行发现的新漏洞,目前尚无该漏洞被恶意利用的证据。
受影响的Windows版本:
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows 8.1 for 32-bit systems
Windows 8.1 for x64-based systems
Windows RT 8.1
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1703 for 32-bit Systems
Windows 10 Version 1703 for x64-based Systems
Windows 10 Version 1709 for 32-bit Systems
Windows 10 Version 1709 for 64-based Systems
Windows 10 Version 1709 for ARM64-based Systems
Windows 10 Version 1803 for 32-bit Systems
Windows 10 Version 1803 for ARM64-based Systems
Windows 10 Version 1803 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1903 for 32-bit Systems
Windows 10 Version 1903 for ARM64-based Systems
Windows 10 Version 1903 for x64-based Systems
Windows Server 2012
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 R2 (Server Core installation)
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server, version 1803 (Server Core Installation)
Windows Server, version 1903 (Server Core installation)
不受影响的Windows版本:
Windows XP,Windows Server 2003和Windows Server 2008(非R2版本)不受影响,远程桌面协议(RDP)本身也不受影响。
漏洞缓解:
在启用了网络级别身份验证(NLA)的受影响系统上可部分缓解,可能利用此漏洞的“可疑”恶意软件或高级恶意软件威胁,因为NLA在触发漏洞之前需要进行身份验证。但是,如果攻击者具有可用于成功进行身份验证的有效凭据,则受影响的系统仍然容易受到远程执行代码执行(RCE)的攻击。
漏洞修复建议:
用户可以使用Windows Update修复漏洞,腾讯安全即将通过腾讯电脑管家和腾讯御点终端安全管理系统向用户推送该补丁,我们会密切关注有关该漏洞的进一步信息。

企业用户如需支持,请联络腾讯安全企业应急响应中心:
邮箱:es@tencent.com
QQ:800846878
电话:0755-86399799
参考链接:
https://msrc-blog.microsoft.com/2019/08/13/patch-new-wormable-vulnerabilities-in-remote-desktop-services-cve-2019-1181-1182
https://guanjia.qq.com/news/n5/2516.html
腾讯御见威胁情报中心百万年薪招募精英队友(有新增职位)



