• AI Search
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Security

Microsoft Warns Of Major WannaCry-like Windows Security Vulnerability, Releases XP Patches

Theresa Casimir by Theresa Casimir
May 16, 2019
in Security, Software
Share on FacebookShare on Twitter

What just happened? Microsoft has warned that the Internet could see a potential widespread attack owing to a high-severity vulnerability found in older versions of Windows. No related exploits have been observed by the company yet but it has urged users to apply the latest security patches to avoid another WannaCry-like incident. Thankfully, Windows 8 and 10 remain unaffected by this vulnerability—Users of Windows 7 and older versions should immediately apply a critical update issued by Microsoft to fix a major security flaw in its Remote Desktop Services, formerly known as Terminal Services. the Remote Desktop Protocol itself is not susceptible, but that the vulnerability is pre-authentication and requires no user interaction

As if a self-replicating, code-execution vulnerability wasn’t serious enough, CVE-2019-0708, as the flaw in Windows Remote Desktop Services is indexed, requires low complexity to exploit. Microsoft Common Vulnerability Scoring System Calculator scores that complexity as 3.9 out of 10. (To be clear, the WannaCry developers had potent exploit code written by, and later stolen from, the National Security Agency, to exploit the wormable CVE-2017-0144 and CVE-2017-0145 flaws, which had exploit complexities rated as “high.”) Ultimately, though, developing reliable exploit code for this latest Windows vulnerability will require relatively little work.

According to Microsoft:

To exploit this vulnerability an attacker must first have gained unprivileged access to a system. This could be done through or malware or a manual attack. “An elevation of privilege vulnerability exists in the way Windows Error Reporting (WER) handles files. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with administrator privileges. To exploit the vulnerability, an attacker must first gain unprivileged execution on a victim system.”

“This vulnerability is pre-authentication and requires no user interaction,” Simon Pope, director of incident response at the Microsoft Security Response Center, wrote in a published post that coincided with the company’s security update release. “In other words, the vulnerability is ‘wormable,’ meaning that any future malware that exploits this vulnerability could propagate from vulnerable computer to vulnerable computer in a similar way as the WannaCry malware spread across the globe in 2017. While we have observed no exploitation of this vulnerability, it is highly likely that malicious actors will write an exploit for this vulnerability and incorporate it into their malware.”

As with the nasty WannaCry, a widespread attack that locked computers and held them ransom, Microsoft is taking the rare step of issuing security patches for Windows XP and Windows Server 2003—two “dead” out-of-support operating systems—to subdue the latest worm’s impact. Windows 7, Windows Server 2008, and Windows Server 2008 R2 also received critical updates to protect against this new security vulnerability, which targets the OS’s Remote Desktop Services.

However, Windows 10 indeed provides stronger protection than past versions of Windows, especially if you’ve splurged on a Windows 10 Pro license. But the default security often isn’t enough in today’s hyper-connected world. A solid AV program can’t block gaping security holes like this one, but it can detect and block the more commonplace malware you might encounter during day-to-day life

Users of Windows 7, Windows Server 2008 RT, and Windows Server 2008, all of which are still supported versions of Windows, should use Windows Update to apply the necessary security patch. Older Windows versions like Windows 2003 and XP—which Microsoft ended support for earlier this year—won’t get the fix through Windows Update, but can and should apply it manually.

Related Posts:

  • microsofts-surface-duo-dualscreen-androi-5f1f3d057e8c350ae07dd862-1-jul-28-2020-15-24-20-poster
    Microsoft Patch Tuesday Fixes 63 Bugs, 1 Zero-Day
  • 020tYFWBL4Yz8jIIFUdKDR1-22
    A Fix to Microsoft Windows Defender And Security Flaws
  • Screenshot 2023-01-30 at 14.03.31
    Microsoft to Discontinue Remote Desktop Service
  • windows-11-surpasses-one-billion-users-despite-mix
    Windows 11 Surpasses One Billion Users Despite Mixed…
  • windows-update-close
    Microsoft Releases Emergency Patch For Windows Update Bug
  • Microsoft_Office_Outlook_(2018–present).svg
    Microsoft Confirms Emergency Update for Millions of…
  • 11-1024×576
    Count Down To The End Of Windows 10 Microsoft Support
  • win10-new-1152×648
    Microsoft’s $1.50 Windows Update Fee Kicks In July 1

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: CVE-2019-0708microsoftsecuritysecurity flawsoftwarewannacrywindows
Theresa Casimir

Theresa Casimir

New at TechBooky, write on important tech stuff from around the world

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • Uber exits Tanzania after Years of Regulatory Tension February 2, 2026
  • SpaceX Proposes Launch of One Million Solar Data Center Satellites February 2, 2026
  • Microsoft Resolves Outlook Encryption Access Issue February 2, 2026
  • Kuda Eyes Hybrid Banking With New National Licence February 2, 2026
  • Microsoft To Turn Off NTLM By Default In Future Windows February 1, 2026
  • Free YouTube Background Play: Google Confirms Crackdown February 1, 2026
  • Google Dismantles Secret Network Hijacking Phone Data February 1, 2026
  • NCC Data Shows Average Download Speeds Hit 20.5 Mbps in Q4 2025 February 1, 2026
  • U.S. Probes Claim Meta Can Read Encrypted WhatsApp Chats February 1, 2026
  • OpenClaw’s Viral Rise Exposes Security Risks in Agentic AI February 1, 2026
  • Nvidia CEO Reaffirms Commitment to OpenAI Amid Rumours February 1, 2026
  • AI Chatbots Increasingly Cite Musk’s Grokipedia Despite Concerns February 1, 2026

Browse Archives

February 2026
MTWTFSS
 1
2345678
9101112131415
16171819202122
232425262728 
« Jan    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • AI Search
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.