Security News > 2019 > June > NSA Urges Windows Users to Patch 'BlueKeep' Vulnerability
2019-06-05 12:54
The U.S. National Security Agency (NSA) on Tuesday urged Windows users and administrators to immediately address the vulnerability tracked as BlueKeep and CVE-2019-0708. read more
News URL
Related news
- Check Point warns customers to patch VPN vulnerability under active exploitation (source)
- New PHP Vulnerability Exposes Windows Servers to Remote Code Execution (source)
- VMware fixes critical vCenter RCE vulnerability, patch now (source)
- SolarWinds Serv-U Vulnerability Under Active Attack - Patch Immediately (source)
- Exploit Attempts Recorded Against New MOVEit Transfer Vulnerability - Patch ASAP! (source)
- GitLab Releases Patch for Critical CI/CD Pipeline Vulnerability and 13 Others (source)
- Critical Windows licensing bugs, plus two others under attack, top Patch Tuesday (source)
- Critical Apache HugeGraph Vulnerability Under Attack - Patch ASAP (source)
- Windows Patch Tuesday update might send a user to the BitLocker recovery screen (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-05-16 | CVE-2019-0708 | Use After Free vulnerability in multiple products A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'. | 9.8 |