Microsoft’s latest security updates patch more wormable vulnerabilities related to Remote Desktop Services (RDS) and the company has published a blog post to warn users about the risk they pose.
Microsoft’s August 2019 Patch Tuesday updates fix over 90 flaws, including some critical RDS vulnerabilities that can be exploited by sending specially crafted requests to the targeted system via RDP. Exploitation of the vulnerabilities does not require any user interaction or authentication.
Microsoft’s blog post warns users of two vulnerabilities, CVE-2019-1181 and CVE-2019-1182, which the company says are similar to the bug tracked as BlueKeep and CVE-2019-0708, and are both wormable.
“These two vulnerabilities are also ‘wormable’, meaning that any future malware that exploits these could propagate from vulnerable computer to vulnerable computer without user interaction,” said Simon Pope, Director of Incident Response at MSRC.
However, experts have pointed out that two other RDS flaws resolved this month, CVE-2019-1222 and CVE-2019-1226, also have a very similar description and are also more likely to be exploited in malicious attacks.
CVE-2019-1181 and CVE-2019-1182 appear to impact all supported versions of Windows, while CVE-2019-1222 and CVE-2019-1226 only affect Windows 10, Windows Server, and Windows Server 2019.
Users can partially mitigate these types of vulnerabilities by enabling Network Level Authentication (NLA). This method only works as long as the attacker doesn’t find a way to obtain valid credentials.
Microsoft has issued several warnings about the BlueKeep vulnerability. The company’s most recent blog post on the matter, published on August 8, informed users that there were still more than 400,000 endpoints vulnerable to attacks due to the lack of NLA.
In a report published recently, cybersecurity firm BitSight said it had seen over 788,000 systems that were still vulnerable to BlueKeep attacks as of July 23.
While several companies and researchers claim to have developed proof-of-concept (PoC) exploits for the BlueKeep vulnerability, attacks have yet to be seen in the wild. However, many, including Microsoft, believe it’s only a matter of time until we see malicious attacks. Others have pointed out that BlueKeep may have already been exploited in targeted attacks that have not been made public.
Related: Crypto-Mining Botnet Implements BlueKeep Scanner
Related: NSA Urges Windows Users to Patch ‘BlueKeep’ Vulnerability

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Hive Ransomware Operation Shut Down by Law Enforcement
- UK Gov Warns of Phishing Attacks Launched by Iranian, Russian Cyberspies
- Dozens of Cybersecurity Companies Announced Layoffs in Past Year
- Security Update for Chrome 109 Patches 6 Vulnerabilities
- New Open Source OT Security Tool Helps Address Impact of Upcoming Microsoft Patch
- Forward Networks Raises $50 Million in Series D Funding
- Apple Patches Exploited iOS Vulnerability in Old iPhones
- FBI Confirms North Korean Hackers Behind $100 Million Horizon Bridge Heist
Latest News
- Cyberattacks Target Websites of German Airports, Admin
- US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’
- Tenable Launches $25 Million Early-Stage Venture Fund
- 820k Impacted by Data Breach at Zacks Investment Research
- Mapping Threat Intelligence to the NIST Compliance Framework Part 2
- Hive Ransomware Operation Shut Down by Law Enforcement
- US Government Agencies Warn of Malicious Use of Remote Management Software
- UK Gov Warns of Phishing Attacks Launched by Iranian, Russian Cyberspies
