Mitigation and Protection
The first line of protection against any vulnerability is to ensure the affected systems are patched with Microsoft's latest security update. This continues to be the primary recommendation for protection against any exploit that may arise from this vulnerability. Due to the sheer volume of systems that utilize Remote Desktop Services and threat potential of a fast spreading exploit, it is imperative that organizations and individual apply the patches from Microsoft as soon as possible.
Microsoft has also issued out-of-band patches and guidance for some versions of Windows that have already reached EOL (such as Windows XP and Server 2003) because of the seriousness of this issue. More information can be found at: https://support.microsoft.com/en-us/help/4500705/customer-guidance-for-cve-2019-0708 for these.
Microsoft also mentions a partial mitigation on affected systems may be to have Network Level Authentication (NLA) enabled for the non-authenticated user part of an attack. However, affected systems would still be vulnerable if an attacker has valid credentials that can be used to successfully authenticate.
Please visit Microsoft's MSRC Blog for more information at https://blogs.technet.microsoft.com/msrc/2019/05/14/prevent-a-worm-by-updating-remote-desktop-services-cve-2019-0708/.
Trend Micro Detection and Protection
Trend Micro has developed some rules/filters based on our our own analysis of a potential exploit for additional protection. Please note however, in the absence of a true in-the-wild exploit, the effectiveness of a rule or filter of this nature may vary and should not be considered the sole source of protection. Customers are highly encouraged to apply the Microsoft patches where possible, and/or apply the other recommended mitigation strategies recommended such as enabling NLA and disabling non-critical RDP services and connections. More general RDP strategies can also be found in Trend Micro's InfoSec Guide: Remote Desktop Protocol at https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/infosec-guide-remote-desktop-protocol-rdp.
Trend Micro will continue to to monitor for signs of active exploitation and will continue to to provide additional updates and rules if/when necessary.
Deep Security, Vulnerability Protection and Apex One Vulnerability Protection (iVP)
· Rule 1009749 - Microsoft Windows Remote Desktop Services Remote Code Execution Vulnerability (CVE-2019-0708)
TippingPoint
· Filter 35285: RDP: Windows Remote Desktop Services Remote Code Execution Vulnerability
In addition, Trend Micro does provide the following generic detection and protection for Deep Security, Vulnerability Protection, Apex One Vulnerability Protection (iVP) and TippingPoint targeted towards general RDP-based threats.
Deep Security and Vulnerability Protection
RDP Traffic:
· Rule 1002508 – RDP (monitor RDP traffic)
Brute Force Detection:
· Rule 1009448 - Microsoft Windows Remote Desktop Protocol (RDP) Brute Force Attempt
Terminal Services Detection:
· Rule 1009549 - Detected Terminal Services (RDP) Server Traffic - 1 (ATT&CK T1015,T1043,T1076)
· Rule 1001164 - Detected Terminal Services (RDP) Server Traffic
In additional the following rules are available in Deep Security (only)
Brute Force Detection:
· Rule 1003716 - Identified Too Many Remote Desktop Protocol (RDP) Connection Request
Log Inspection:
· Rule 1002795 - Microsoft Windows Events - "Multiple Windows Logon Failures"
· Rule 1002795 - Microsoft Windows Events - "Windows Logon Failure”
· Rule 1004057 - Microsoft Windows Security Events - 1 "Logon attempted using explicit credentials"
Apex One Vulnerability Protection (iVP)
· Rule 1009448 - Microsoft Windows Remote Desktop Protocol (RDP) Brute Force Attempt
TippingPoint
· Filter 5683 RDP: Windows Remote Desktop Access on Non-Standard Ports
· Filter 5873 RDP: Windows Remote Desktop Access
· Filter 6197 RDP: Windows Remote Desktop Access on Non-Standard Ports (HTTP)
· Filter 10957 RDP: Windows Remote Desktop Brute Force Attempt by NCrack
· Filter 12134 RDP: Remote Desktop Denial of Service Attack
· Filter 22166 RDP: Windows Remote Desktop Access Over UDP
· Filter 22167 RDP: Windows Remote Desktop Access Over UDP on Non-Standard Ports
Trend Micro will continue to closely monitor this issue and will provide updates on specific vulnerability detection guidance or any known threat or exploit information that may arise.
References
· Microsoft Security Bulletin: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708
· Microsoft Customer Guidance for EOL Products: https://support.microsoft.com/en-us/help/4500705/customer-guidance-for-cve-2019-0708
· Microsoft MSRC Blog: https://blogs.technet.microsoft.com/msrc/2019/05/14/prevent-a-worm-by-updating-remote-desktop-services-cve-2019-0708/
· Trend Micro InfoSec Guide: Remote Desktop Protocol (RDP) - https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/infosec-guide-remote-desktop-protocol-rdp
· MITRE CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0708