There was a problem loading the comments.

Zero-Day Emergency Security Patching for certain fully managed servers

Support Portal  »  Announcements  »  Viewing Article

  Print
Dear Customers

A pre-authentication vulnerability targeting Remote Desktop Protocol in servers running Windows Server 2008 R2 or older has been discovered that allows for Remote Code Execution.

Because the vulnerability requires absolutely no authentication, it could be spread rapidly within a network via use of 'Worm' style malware, at which point the exploiter would effectively have full control of all infected hosts.

Due to the ease of exploitation, and the impact of exploitation, we would like to request you that please contact to our support team members and scheduled it who have FULLY managed service for install these patches. If you are having unmanaged VPS / dedicated servers then you will need to install it yourself.

You can read more about the exploit (and patches mitigating it), here: https://blogs.technet.microsoft.com/msrc/2019/05/14/prevent-a-worm-by-updating-remote-desktop-services-cve-2019-0708/

Thanks & Regards,
Softsys Hosting

Share via
Did you find this article useful?  

Related Articles

© Softsys Hosting