Zero-Day Emergency Security Patching for certain fully managed servers

  Print
Dear Customers

A pre-authentication vulnerability targeting Remote Desktop Protocol in servers running Windows Server 2008 R2 or older has been discovered that allows for Remote Code Execution.

Because the vulnerability requires absolutely no authentication, it could be spread rapidly within a network via use of 'Worm' style malware, at which point the exploiter would effectively have full control of all infected hosts.

Due to the ease of exploitation, and the impact of exploitation, we would like to request you that please contact to our support team members and scheduled it who have FULLY managed service for install these patches. If you are having unmanaged VPS / dedicated servers then you will need to install it yourself.

You can read more about the exploit (and patches mitigating it), here: https://blogs.technet.microsoft.com/msrc/2019/05/14/prevent-a-worm-by-updating-remote-desktop-services-cve-2019-0708/

Thanks & Regards,
Softsys Hosting

Did you find this article useful?   0 out of 0 people found this article useful.

Related Articles

Login

 
Forgot password?
Register now

Language