遠程桌面協議(RDP, Remote Desktop Protocol)是一個多通道(multi-channel)的協議,讓用戶(客戶端或稱“本地電腦”)連上提供微軟終端機服務的電腦(服務器端或稱“遠程電腦”)是大部分的Windows都有客戶端所需軟件,RDP服務默認監聽本機3389端口。
根據MSRC公告顯示,本漏洞為RDP服務遠程代碼執行漏洞,未經認證的惡意攻擊者通過向目標主機RDP服務所在端口發送精心構造的請求,即可在目標主機執行任意代碼。該漏洞利用門檻低,危害大且攻擊者可通過該漏洞橫向蠕蟲傳播,感染大量主機,危害效果可堪比2017年WannaCry等具備勒索能力的惡意程序。
目前官方暫未公開漏洞細節,建議受影響用戶盡快安裝補丁進行更新,修復此漏洞。
Windows 7
Windows Server 2008
Windows Server 2008 R2
Windows XP
Windows Server 2003
Windows 8
Windows 10
微軟官方已經發布更新補丁(包括官方停止維護版本),請用戶及時進行補丁更新。
用戶可通過微軟自動更新功能、WSUS服務或下載補丁方式修復該漏洞,下表為不同操作系統對應補丁鏈接:
|
操作系統版本
|
補丁下載鏈接
|
|
Windows 7 x86
|
http://download.windowsupdate.com/d/msdownload/update/software/secu/2019/05/windows6.1-kb4499175-x86_6f1319c32d5bc4caf2058ae8ff40789ab10bf41b.msu
|
|
Windows 7 x64
|
http://download.windowsupdate.com/d/msdownload/update/software/secu/2019/05/windows6.1-kb4499175-x64_3704acfff45ddf163d8049683d5a3b75e49b58cb.msu
|
|
Windows Embedded Standard 7 for x64
|
http://download.windowsupdate.com/d/msdownload/update/software/secu/2019/05/windows6.1-kb4499175-x64_3704acfff45ddf163d8049683d5a3b75e49b58cb.msu
|
|
Windows Embedded Standard 7 for x86
|
http://download.windowsupdate.com/d/msdownload/update/software/secu/2019/05/windows6.1-kb4499175-x86_6f1319c32d5bc4caf2058ae8ff40789ab10bf41b.msu
|
|
Windows Server 2008 x64
|
http://download.windowsupdate.com/d/msdownload/update/software/secu/2019/05/windows6.0-kb4499149-x64_9236b098f7cea864f7638e7d4b77aa8f81f70fd6.msu
|
|
Windows Server 2008 Itanium
|
http://download.windowsupdate.com/d/msdownload/update/software/secu/2019/05/windows6.0-kb4499180-ia64_805e448d48ab8b1401377ab9845f39e1cae836d4.msu
|
|
Windows Server 2008 x86
|
http://download.windowsupdate.com/d/msdownload/update/software/secu/2019/05/windows6.0-kb4499149-x86_832cf179b302b861c83f2a92acc5e2a152405377.msu
|
|
Windows Server 2008 R2 Itanium
|
http://download.windowsupdate.com/c/msdownload/update/software/secu/2019/05/windows6.1-kb4499175-ia64_fabc8e54caa0d31a5abe8a0b347ab4a77aa98c36.msu
|
|
Windows Server 2008 R2 x64
|
http://download.windowsupdate.com/d/msdownload/update/software/secu/2019/05/windows6.1-kb4499175-x64_3704acfff45ddf163d8049683d5a3b75e49b58cb.msu
|
|
Windows Server 2003 x86
|
http://download.windowsupdate.com/d/csa/csa/secu/2019/04/windowsserver2003-kb4500331-x86-custom-chs_4892823f525d9d532ed3ae36fc440338d2b46a72.exe
|
|
Windows Server 2003 x64
|
http://download.windowsupdate.com/d/csa/csa/secu/2019/04/windowsserver2003-kb4500331-x64-custom-chs_f2f949a9a764ff93ea13095a0aca1fc507320d3c.exe
|
|
Windows XP SP3
|
http://download.windowsupdate.com/c/csa/csa/secu/2019/04/windowsxp-kb4500331-x86-custom-chs_718543e86e06b08b568826ac13c05f967392238c.exe
|
|
Windows XP SP2 for x64
|
http://download.windowsupdate.com/d/csa/csa/secu/2019/04/windowsserver2003-kb4500331-x64-custom-enu_e2fd240c402134839cfa22227b11a5ec80ddafcf.exe
|
|
Windows XP SP3 for XPe
|
http://download.windowsupdate.com/d/csa/csa/secu/2019/04/windowsxp-kb4500331-x86-embedded-custom-chs_96da48aaa9d9bcfe6cd820f239db2fe96500bfae.exe
|
|
WES09 and POSReady 2009
|
http://download.windowsupdate.com/d/msdownload/update/software/secu/2019/04/windowsxp-kb4500331-x86-embedded-chs_e3fceca22313ca5cdda811f49a606a6632b51c1c.exe
|
若用戶暫不方便安裝補丁更新,可采取下列臨時防護措施,對此漏洞進行防護。
1. 若用戶不需要用到遠程桌面服務,建議禁用該服務。
2. 在主機防火墻中對遠程桌面TCP 端口(默認為 3389)進行阻斷。
3. 啟用網絡級認證(NLA),此方案適用于Windows 7, Windows Server 2008, Windows Server 2008 R2。
https://blogs.technet.microsoft.com/msrc/2019/05/14/prevent-a-worm-by-updating-remote-desktop-services-cve-2019-0708/?from=groupmessage&isappinstalled=0
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708