- Supportcenter
- Flersprogede
- Sprog
- Hjælp os med at oversætte
Experte i
løsninger til vedligeholdelse af PC
Alt-i-en til PC-vedligeholdelse: Rengøring, optimering og sikkerhed
Omfattende oprydning af PC, optimering og beskyttelse
Holder drev opdaterede
Mere stabil præstation med færre systemsammenbrydninger
Beskyt millioner af computere mod Malware
Top computer sikkerhed med all-round beskyttelse
Beskytter mod virusser & booster pc-præstation
Fjerner nemt uønskede programmer og restfiler
Holder dit software automatisk up-to-date
Aldrig bekymr dig om datatyveri eller lækning af dit privatliv
Maksimer harddrive optimering og få en hurtigere PC
Få glæde af en hurtigere samt sikrere Mac
On May 14th, Microsoft released an urgent security update CVE-2019-0708, to protect Windows users against the critical remote code execution vulnerability existed in Remote Desktop Services. It’s a wormable flaw that may spread rapidly worldwide as bad as Wannacry attack in 2017, which affected around 200,000 computers across 150 countries.
What can a hacker do using the remote code execution vulnerability?
Once successfully exploited, this vulnerability will allow a hacker to gain unauthorized access to your system using RDP and then install programs; view, change, or delete personal data; or create new accounts with full user rights. This vulnerability is pre-authentication and requires no user interaction. To exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems Remote Desktop Service via RDP.
How serious is this vulnerability?
Microsoft made the decision to push out security updates for platforms that are out of support for many years such as Windows XP. So if you’re running the old versions of Windows including Windows 7, Windows XP, and some Server versions such as Windows Server 2003 and 2008, it’s highly recommended to update the patch CVE-2019-0708 to protect you against a potential Wannacry-like attack. Windows 8 and 10 are safe from this vulnerability.
How to patch your Windows 7 and Windows XP with CVE-2019-0708?
CVE-2019-0708 addresses the vulnerability by correcting how Remote Desktop Services handles connection requests.
Solution 1 Download the patch manually on Microsoft official website
Click to download the patch for Windows 7, Windows 2008 and Windows 2008 R2
Click to download the patch for Windows XP and Windows Server 2003
Solution 2 Get CVE-2019-0708 automatically with Advanced SystemCare 12
Advanced SystemCare 12 gets the security updates directly from Microsoft server and patches users’ system automatically.
Step 1 Download Advanced SystemCare 12
> Launch Advanced SystemCare 12 and select “Security Reinforce” and “Vulnerability Fix”.
> Click “Scan” to start the vulnerability detection and install CVE-2019-0708 automatically.
Step 2 Enable Deep Reinforce feature to upgrade the protection
Deep Reinforce feature will improve the security of the system to prevent from being hacked online. It can deeply diagnose and fix system weaknesses and vulnerabilities such as RDP, UAC and Windows Updates. Learn more about Advanced SystemCare 12 Pro.
In recent years, a large number of cyber attacks occurred and affected millions of individuals and companies. You might be also interested in reading more:
How to Prevent WannaCry Attacks
How to Protect Yourself from Petya/GoldenEye Ransomware
Things to know about Intel Kernel Flaws and Alternative Fixes for Windows Users - Updated
Abonnér for at holde dig opdateret om produktopdateringer og specielle tilbud via e-mail. Du kan til enhver tid opsige abonnementet med et enkelt klik.
© 2005 - IObit. Alle rettigheder forbeholdt |Slutbrugeraftale |Juridisk meddelelse |Privatlivspolitik |Tilbagebetalingspolitik
IObit bruger cookies for at forbedre indholdet og sikre, at du får den bedste oplevelse på vores hjemmesider. For at gennemse vores hjemmesider må du acceptere vores privatlivspolitik.
Jeg accepterer