- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Enhanced Security Measures in Place: To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.
05-14-2019 06:41 PM - edited 05-14-2019 07:38 PM
Hi,
just wondering on expected release for signature for this Vulnerability?
CVE-2019-0708 - Remote Desktop Services Remote Code Execution Vulnerability
Details here:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708
regards
Paul
05-21-2019 04:51 PM - edited 05-21-2019 05:11 PM
05-15-2019 08:04 AM
Hi Guys,
Any idea, by when we have signatures for this CVE ?
CVE-2019-0708
@Paul_Stinson wrote:Hi,
just wondering on expected release for signature for this Vulnerability?
CVE-2019-0708 - Remote Desktop Services Remote Code Execution Vulnerability
Details here:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708
regards
Paul
05-16-2019 04:48 AM
hey,
got an response from TAC:
Regarding Microsoft CVE-2019-0708, PA has investigated a feasibility of network-based vulnerability signature coverage and so far there is no known exploitation of this CVE to possibly create a coverage signature at this time. PA will continue observe should there is any change with regards to this CVE. As per Microsoft advisory a software update fix is currently available for any impacted version of Windows.
05-16-2019 08:11 PM
Cheers thanks for the update.....interesting that there is a patch to patch the vulnerability but a signature can't be created for the vulnerability! 😉
05-20-2019 12:49 PM
Is Palo Alto at least looking into creating a signature? TippingPoint has one and Cisco Talos is looking into creating a Snort rule.
05-21-2019 06:43 AM
Snort sigs are live for this as of last night -
https://blog.snort.org/2019/05/snort-rule-update-for-may-20-2019.html
05-21-2019 12:26 PM
The signatures dont specifically detect CVE-2019-0708 they were developed to help identify "emerging threats"
I have just been informed that Palo Alto's Threat team has a working PoC and are developing a signature.
05-21-2019 12:29 PM
Cisco and Checkpoint both have prevent signatures live right now. PAN is in field POC testing from what I am told and the signature should be GA here in a day or two.
05-21-2019 04:51 PM - edited 05-21-2019 05:11 PM
05-21-2019 04:55 PM - edited 05-21-2019 04:56 PM
TAC only Link?
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!