CVE-2019-1222

critical

Description

A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems Remote Desktop Service via RDP. The update addresses the vulnerability by correcting how Remote Desktop Services handles connection requests.

References

https://www.tenable.com/cyber-exposure/2020-threat-landscape-retrospective

https://www.tenable.com/blog/microsoft-s-january-2020-patch-tuesday-kicks-off-the-new-year-with-49-new-cves

https://www.tenable.com/blog/objects-in-mirror-are-closer-than-they-appear-reflecting-on-the-cybersecurity-threats-from-2019

https://www.tenable.com/blog/tenable-roundup-for-microsoft-s-august-2019-patch-tuesday-dejablue

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1222

https://cert-portal.siemens.com/productcert/pdf/ssa-187667.pdf

http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190819-01-windows-en

Details

Source: Mitre, NVD

Published: 2019-08-14

Updated: 2024-05-29

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical