Unknown
CVE-2019-0708
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2019-0708
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka ‘Remote Desktop Services Remote Code Execution Vulnerability’.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- huawei,
- microsoft,
- siemens
Products
- agile controller-campus firmware v100r002c00,
- agile controller-campus firmware v100r002c10,
- aptio firmware,
- atellica solution firmware,
- axiom multix m firmware,
- axiom vertix md trauma firmware,
- axiom vertix solitaire m firmware,
- bh620 v2 firmware v100r002c00,
- bh621 v2 firmware v100r002c00,
- bh622 v2 firmware v100r001c00,
- bh640 v2 firmware v100r002c00,
- centralink firmware,
- ch121 firmware v100r001c00,
- ch140 firmware v100r001c00,
- ch220 firmware v100r001c00,
- ch221 firmware v100r001c00,
- ch222 firmware v100r002c00,
- ch240 firmware v100r001c00,
- ch242 firmware v100r001c00,
- ch242 v3 firmware v100r001c00,
- e6000 chassis firmware v100r001c00,
- e6000 firmware v100r002c00,
- elog firmware v200r003c10,
- espace ecs firmware v300r001c00,
- gtsoftx3000 firmware v200r001c01spc100,
- gtsoftx3000 firmware v200r002c00spc300,
- gtsoftx3000 firmware v200r002c10spc100,
- lantis firmware,
- mobilett xp digital firmware,
- multix pro acss firmware,
- multix pro acss p firmware,
- multix pro firmware,
- multix pro navy firmware,
- multix pro p firmware,
- multix swing firmware,
- multix top acss firmware,
- multix top acss p firmware,
- multix top firmware,
- multix top p firmware,
- oceanstor 18500 firmware v100r001c30spc300,
- oceanstor 18800 firmware v100r001c30spc300,
- oceanstor 18800f firmware v100r001c30spc300,
- oceanstor hvs85t firmware v100r001c00,
- oceanstor hvs85t firmware v100r001c30spc200,
- oceanstor hvs88t firmware v100r001c00,
- oceanstor hvs88t firmware v100r001c30spc200,
- rapidpoint 500 firmware,
- rh1288 v2 firmware v100r002c00,
- rh1288a v2 firmware v100r002c00,
- rh2265 v2 firmware v100r002c00,
- rh2268 v2 firmware v100r002c00,
- rh2285 v2 firmware v100r002c00,
- rh2285h v2 firmware v100r002c00,
- rh2288 v2 firmware v100r002c00,
- rh2288a v2 firmware v100r002c00,
- rh2288e v2 firmware v100r002c00,
- rh2288h v2 firmware v100r002c00,
- rh2485 v2 firmware v100r002c00,
- rh5885 v2 firmware v100r001c00,
- rh5885 v3 firmware v100r003c00,
- seco vsm firmware v200r002c00,
- smc2.0 firmware v500r002c00,
- smc2.0 firmware v600r006c00,
- streamlab firmware,
- syngo lab process manager,
- uma firmware v200r001c00,
- uma firmware v300r001c00,
- vertix solitaire firmware,
- viva e firmware,
- viva twin firmware,
- windows 7 -,
- windows server 2008 -,
- windows server 2008 r2,
- x6000 firmware v100r002c00,
- x8000 firmware v100r002c20
Metasploit Modules
Exploited in the Wild
- Government or Industry Alert (https://us-cert.cisa.gov/ncas/alerts/aa20-275a)
- Other: Ransomware Report 2023 (https://cybersecurityworks.com/howdymanage/uploads/file/Ransomware%20Report%202023_compressed.pdf)
Would you like to delete this Exploited in the Wild Report?
Yes, delete this reportWould you like to delete this Exploited in the Wild Report?
Yes, delete this reportReferences
Advisory
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: