CVE-2019-0708 (BlueKeep)

June 5, 2019 03:00 PM

Patch Tuesday is an unofficial term used to refer to Microsoft’s regular release of security updates for its products. On May 14, 2019, Patch Tuesday included 79 vulnerabilities in an update from Microsoft.

Download Article


Patch Tuesday is an unofficial term used to refer to Microsoft’s regular release of security updates for its products. On May 14, 2019, Patch Tuesday included 79 vulnerabilities in an update from Microsoft. Of the 79 vulnerabilities, 22 of them were labeled as critical, four of those being remote code execution attacks.

This Microsoft update quickly gained media attention amidst a flurry of other releases that included several updates from Adobe, a processor exploit called Zombieload1, a buffer overflow in WhatsApp2 and 😾😾😾, also known as Thrangrycat3, affecting Cisco Products. The reason why this Microsoft update4 generated so much attention is due to warnings about a specific vulnerability, CVE-2019-07085, a remote code execution vulnerability in Microsoft’s remote desktop protocol. Microsoft noted in their update that this vulnerability is wormable and presents a risk similar to WannaCry6 , NotPetya7, and BadRabbit8.


CVE-2019-0708, named BlueKeep, is a vulnerability what was publicly disclosed during Microsoft’s Patch Tuesday in May. Microsoft in-support systems that are vulnerable to this attack include Windows 7, Windows Server 2008, and Windows Server 2008 R2. This potential impact from this disclosure was severe enough that Microsoft even released an update for out-of-support systems impacted by the vulnerability. These systems included Windows 2003 and Windows XP.

As Microsoft has warned, this vulnerability requires no user interactions and is wormable. A system is simply exploited by sending a specially crafted request to a remote Windows instance. The exploit abuses how Remote Desktop Services handle the connection request. Several proofs-of-concepts for the exploit now exist, but there are no active campaigns as of this moment.

Microsoft and researchers over the past several weeks have been advising users and corporations about this vulnerability and the possibility of a significant event in the coming months. Many parallels have also been drawn to the events that unfolded after Microsoft released MS17-0109, the update that patched a vulnerability in Windows that would be exploited by WannaCry two months later.


At the moment, these are all just warnings from the Microsoft/security community in combination with patches and updates from Microsoft. Corporations need to take inventory and understand which devices they have on their networks so they can maintain and patch them.

In this case, researchers and vendors were able to get in front of a possible campaign. The only thing left standing between cybercriminals and your network is proper security hygiene. Corporations, both large and small, must enforce timely updates and system patches when vulnerabilities are disclosed.

Patch Tuesday is the second and fourth Tuesday of every month.


It’s advised that corporations apply patches and update all systems, including those that are out of support. If your devices are out of support, consider upgrading. The second piece of advice comes from researcher Robert Graham’s blog, Almost One Million Vulnerable to BlueKeep Vuln10, where he details a more critical problem that needs to be addressed inside corporate environments: psexec, a versatile Windows command line tool that lets you run processes on remote systems with local user credentials. 

“You may have only one old WinXP machine that's vulnerable, that you don't care if it gets infected with ransomware. But, that machine may have a Domain Admin logged in, so that when the worm breaks in, it grab those credentials and uses them to log onto the Domain Controller. Then, from the Domain Controller, the worm sends a copy of itself to all the desktop and servers in the organization, using those credentials instead of the vuln. This is what happened with notPetya: the actual vulnerability wasn't the problem, it was psexec that was the problem.”

Under Attack and in Need of Emergency Assistance? Radware Can Help.

Radware offers a service to help respond to security emergencies, neutralize the risk and better safeguard operations before irreparable damages occur. If you’re under DDoS attack or malware outbreak and in need of emergency assistance, Contact us with the code "Red Button.”











Cybercriminals come in all shapes and sizes. Understanding their motivations, skills and modi operandi is key.

Download the Hacker's Almanac

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

Get Social

Connect with experts and join the conversation about Radware technologies.

Security Research Center