Security updates releases on Microsoft: Ransomware discovered a wormable threat similar to WannaCry

Security updates releases on Microsoft: Ransomware discovered a wormable threat similar to WannaCry

Microsoft has taken many steps to release the security updates for widely-used Windows operating systems like Windows 2003 and XP. The organization took this move as a part of its May 14 Patch Tuesday, due to the discovery of a wormable threat that could be a major threat similar to the WannaCry ransomware attacks of 2017.

The WannaCry ransomware threat was quick to spread across the world in May 2017 due to the vulnerability that was widespread among devices running older versions of Windows and Windows XP.

On May 14, Microsoft released 16 updates that target at least 79 security issues in the software and the Windows. Now let’s have a look at the CVE-2019-0708, CVE-2019-0863, and vulnerabilities.

Remote desktop services vulnerability- CVE-2019-0708

The CVE-2019-0708 vulnerability is in remote desktop services into supported versions of Windows, including Windows Server 2008 R2, Windows 7, and Windows Server 2008. It is present in devices powered by Windows 2003 and Windows XP.

To attack the device, an unauthenticated attacker fixes to the target system using Remote Desktop Protocol (RDP) and then sends specially crafted requests. This security update now corrects how Remote Desktop Services manages connection requests.

Though the vulnerability CVE-2019-0708 does not affect Microsoft’s latest operating systems, including, Windows 8, Windows 10, Windows 8.1, Windows Server 2016, Windows Server 2019, Windows Server 2012 R2, or Windows Server 2012.

The company hasn’t observed any evidence of attacks against this security flaw, but it may head off an imminent and serious imminent threat.

Zero-day vulnerability CVE-2019-0863

One of the securities updates fixed the zero-day vulnerability, CVE-2019-0863 in the error reporting service Window. An attacker who can successfully exploit this vulnerability can run random code in kernel mode. The attacker can then install programs; view, change, or delete data; or create new accounts with administrator privileges.

An attacker has to gain privileged execution on the victim’s system in order to exploit the vulnerability. Microsoft’s security update addresses this vulnerability by correcting the way Window Error Reporting (WER) handles files.

Office365 and Microsoft Office, .NET Framework, SharePoint, and SQL server are some of the other Microsoft products that received covers.

Kaylee Smith is a self-professed security expert; he has been making the people aware of the security threats. His passion is to write about Cybersecurity, malware, social engineering, Games,internet and new media. He writes for Ms-Office products at www.office.com/setup or office.com/setup .

Leave a Reply

Close Menu