Support Center > Search Results > SecureKnowledge Details
Anti-Exploit Protection for Remote Desktop Protocol Vulnerability (CVE-2019-0708) Technical Level
Solution

Remote Desktop Protocol Vulnerability (CVE-2019-0708)

  • Remote Code Execution Vulnerability
  • Denial of Service Vulnerability

Anti-Exploit now protects against CVE-2019-0708. This CVE represents a critical flaw found in the Remote Desktop Protocol of Windows allowing for either Remote Code Execution or Denial of Service attacks.

Vulnerable systems protected by Anti-Exploit include Windows 7 SP1 and Windows 2008R2.

 

R80.20 and above

Anti-Exploit is enabled, by default, and managed through the Anti-Exploit Settings section. This new protection will be in "prevent" or "detect" mode, based on the global setting of Anti-Exploit.

R80.10 and below

Anti-Exploit will need to be configured via a local policy file. Refer to sk121793 for more information on how to turn on Anti-Exploit.

Note: This protection will be disabled for Windows 8.1 and above Operating Systems. This is because those Operating Systems are not vulnerable.

In order to disable this protection, follow sk154455 on disabling Anti-Exploit protections.

This solution has been verified for the specific scenario, described by the combination of Product, Version and Symptoms. It may not work in other scenarios.
This solution is about products that are no longer supported and it will not be updated

Give us Feedback
Please rate this document
[1=Worst,5=Best]
Comment