Skip to Main Content
PCMag editors select and review products independently. If you buy through affiliate links, we may earn commissions, which help support our testing.

Microsoft Finds 4 New 'Wormable' Flaws in Windows 10

Two of the flaws also affect Windows 7 Service Pack 1, and Windows 8.1. If exploited, they can be used to launch a computer worm to attack vulnerable machines that have Remote Desktop Services activated.

By Michael Kan
August 13, 2019
How to Get Infected With Malware

Microsoft has discovered four serious flaws in Windows 10 that the company fears could be weaponized to launch a computer worm targeting PCs and servers across the world.

The four flaws are "wormable," meaning they could pave the way for malware that automatically spreads from one vulnerable machine to the next, without any action from the user. Two of the flaws affect older operating systems including Windows 7 SP1, Windows 8.1, Windows Server 2008 R2 SP1, and Windows Server 2012. (Windows XP and Windows Server 2003 and 2008 are immune to the threat.)

"It is important that affected systems are patched as quickly as possible," company security manager Simon Pope wrote in a Tuesday blog post.

The vulnerabilities deal with the Remote Desktop Service (RDS) feature in Windows, which IT administrators and users can activate to gain remote control of a Windows machine on a network. Normally, such access requires the correct login credentials. But Microsoft's researchers discovered an unauthenticated attacker can break into an RDS-enabled computer by sending specially crafted data requests.

"An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights," Microsoft says in its security advisories.

The good news is that Microsoft has patched the flaws. The company is rolling out the fixes to customers who have automatic updates turned on. You can also download the patches for the flaws on on Microsoft's website.

CVE-2019-1181 and CVE-2019-1182 affects Windows 10 and Windows Server 2019, in addition to the older Window 7 SP1 and Windows 8.1 operating systems. "At this time, we have no evidence that these vulnerabilities were known to any third party," Pope said in today's blog post.

CVE-2019-1222 and CVE-2019-1226, on the other hand, threaten only Windows 10 and Windows Server 2019.

Windows systems that have disabled RDS will also remain immune to the threat, Pope tweeted. "But these can be activated in multiple ways, so it's best to check in Services if it's enabled before assuming it isn't," he said. Another way to mitigate the threat is to enable "Network Level Authentication" on the RDS-enabled machine.

"NLA requires authentication before the vulnerability can be triggered. However, affected systems are still vulnerable to Remote Code Execution (RCE) exploitation if the attacker has valid credentials that can be used to successfully authenticate," Pope said.

In May, Microsoft disclosed a separate wormable flaw for the RDS feature that affected Windows 7 and Windows XP. But despite the company's warnings, many older Windows machines that have RDS activated remain vulnerable to the threat.

Editor's Note: This story has been updated to include two other flaws that Microsoft's Pope says are also wormable.

The Lightest Laptops for 2019
PCMag Logo The Lightest Laptops for 2019

Get Our Best Stories!

Sign up for What's New Now to get our top stories delivered to your inbox every morning.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.


Thanks for signing up!

Your subscription has been confirmed. Keep an eye on your inbox!

Sign up for other newsletters

TRENDING

About Michael Kan

Senior Reporter

I've been with PCMag since October 2017, covering a wide range of topics, including consumer electronics, cybersecurity, social media, networking, and gaming. Prior to working at PCMag, I was a foreign correspondent in Beijing for over five years, covering the tech scene in Asia.

Read Michael's full bio

Read the latest from Michael Kan