A pre-authentication vulnerability targeting Remote Desktop Protocol in servers running Windows Server 2008 R2 or older has been discovered that allows for Remote Code Execution.
Because the vulnerability requires absolutely no authentication, it could be spread rapidly within a network via use of 'Worm' style malware, at which point the exploiter would effectively have full control of all infected hosts.
Due to the ease of exploitation, and the impact of exploitation, we would like to request you that please contact to our support team members and scheduled it who have FULLY managed service for install these patches. If you are having unmanaged VPS / dedicated servers then you will need to install it yourself.
You can read more about the exploit (and patches mitigating it), here: https://blogs.technet.microsoft.com/msrc/2019/05/14/prevent-a-worm-by-updating-remote-desktop-services-cve-2019-0708/
Thanks & Regards,