Microsoft’s latest security updates patch more wormable vulnerabilities related to Remote Desktop Services (RDS) and the company has published a blog post to warn users about the risk they pose.
Microsoft’s August 2019 Patch Tuesday updates fix over 90 flaws, including some critical RDS vulnerabilities that can be exploited by sending specially crafted requests to the targeted system via RDP. Exploitation of the vulnerabilities does not require any user interaction or authentication.
Microsoft’s blog post warns users of two vulnerabilities, CVE-2019-1181 and CVE-2019-1182, which the company says are similar to the bug tracked as BlueKeep and CVE-2019-0708, and are both wormable.
“These two vulnerabilities are also ‘wormable’, meaning that any future malware that exploits these could propagate from vulnerable computer to vulnerable computer without user interaction,” said Simon Pope, Director of Incident Response at MSRC.
However, experts have pointed out that two other RDS flaws resolved this month, CVE-2019-1222 and CVE-2019-1226, also have a very similar description and are also more likely to be exploited in malicious attacks.
CVE-2019-1181 and CVE-2019-1182 appear to impact all supported versions of Windows, while CVE-2019-1222 and CVE-2019-1226 only affect Windows 10, Windows Server, and Windows Server 2019.
Users can partially mitigate these types of vulnerabilities by enabling Network Level Authentication (NLA). This method only works as long as the attacker doesn’t find a way to obtain valid credentials.
Microsoft has issued several warnings about the BlueKeep vulnerability. The company’s most recent blog post on the matter, published on August 8, informed users that there were still more than 400,000 endpoints vulnerable to attacks due to the lack of NLA.
In a report published recently, cybersecurity firm BitSight said it had seen over 788,000 systems that were still vulnerable to BlueKeep attacks as of July 23.
While several companies and researchers claim to have developed proof-of-concept (PoC) exploits for the BlueKeep vulnerability, attacks have yet to be seen in the wild. However, many, including Microsoft, believe it’s only a matter of time until we see malicious attacks. Others have pointed out that BlueKeep may have already been exploited in targeted attacks that have not been made public.
Related: Crypto-Mining Botnet Implements BlueKeep Scanner
Related: NSA Urges Windows Users to Patch ‘BlueKeep’ Vulnerability

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- UK Car Retailer Arnold Clark Hit by Ransomware
- EV Charging Management System Vulnerabilities Allow Disruption, Energy Theft
- Unpatched Econolite Traffic Controller Vulnerabilities Allow Remote Hacking
- Google Fi Data Breach Reportedly Led to SIM Swapping
- Microsoft’s Verified Publisher Status Abused in Email Theft Campaign
- British Retailer JD Sports Discloses Data Breach Affecting 10 Million Customers
- Meta Awards $27,000 Bounty for 2FA Bypass Vulnerability
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
Latest News
- Google Shells Out $600,000 for OSS-Fuzz Project Integrations
- F5 BIG-IP Vulnerability Can Lead to DoS, Code Execution
- Flaw in Cisco Industrial Appliances Allows Malicious Code to Persist Across Reboots
- UK Car Retailer Arnold Clark Hit by Ransomware
- Dealing With the Carcinization of Security
- HeadCrab Botnet Ensnares 1,200 Redis Servers for Cryptomining
- Cyber Insights 2023 | Supply Chain Security
- Cyber Insights 2023 | Regulations
