For Remote Desktop Services (RDS) privilege escalation and remote code execution vulnerabilities on Windows Server, protection is provided by installing the corresponding security updates (patch packages) for each bulletin that affects RDS/RDP.
From the available information, the following RDS/RDP-related vulnerabilities and updates are relevant:
- MS11-061 – Remote Desktop Web Access elevation of privilege
Applies to Windows Server 2008 R2 editions. The fix is provided via the MS11-061 security update. For affected systems, install the update from Microsoft Update or the security bulletin page. - MS12-020 – Vulnerabilities in Remote Desktop could allow remote code execution
Applies to Windows Server 2008/2008 R2 and earlier client OS versions. Systems with RDP enabled must install the MS12-020 security update from Microsoft Update or the MS12-020 bulletin. - MS15-067 – Vulnerability in RDP could allow remote code execution
Applies to Windows Server 2012 and Windows 7/8. The update resolves an RDP remote code execution vulnerability when the RDP server service is enabled. Install the MS15-067 update (KB listed in the bulletin) on all affected servers and clients. Systems without the RDP server service enabled are not at risk from this specific issue. - MS16-007 – Windows Remote Desktop Protocol Security Bypass (CVE-2016-0019)
Affects Windows 10 hosts running RDP services. The update enforces the default behavior of blocking remote logon for accounts without passwords. Install the MS16-007 update on affected Windows 10 systems. - MS16-017 – RDP Elevation of Privilege (CVE-2016-0036)
Applies to Windows Server 2012, Windows Server 2012 R2, and Windows 8.1/10. The security update (e.g., KB3126446 for Server 2012/2012 R2) replaces earlier RDP-related updates (such as those from MS15-067 or MS15-030). Install the MS16-017 update appropriate for the OS version. - CVE-2019-0708 – Remote Desktop Services Remote Code Execution (“BlueKeep”)
Applies to older platforms such as Windows Server 2003 and Windows Vista. Protection is provided by installing the specific security updates listed (for example, KB4500331 for Windows Server 2003 R2 x64, KB4499180 for Windows Vista SP2/x64). These updates are available via the Microsoft Update Catalog.
For a Windows Server environment:
- Identify the exact OS version and edition (for example, Windows Server 2012, 2012 R2, 2016, etc.).
- For each OS version, install all RDS/RDP-related security updates corresponding to the bulletins above that list that OS as affected.
- Ensure prerequisite updates (such as KB2919355 for Windows 8.1/Server 2012 R2) are installed where required so that later security updates can be applied.
- If RDP/RDS is enabled, treat these updates as critical and deploy them through Windows Update, WSUS, or other patch management tools.
For detailed per-OS package lists and download links, use the security bulletin pages referenced below and the Microsoft Update Catalog entries they point to.
References:
- Customer guidance for CVE-2019-0708 | Remote Desktop Services Remote Code Execution Vulnerability: May 14, 2019
- MS11-061: Vulnerability in Remote Desktop Web Access could allow elevation of privilege: August 9, 2011
- MS15-067: Vulnerability in RDP could allow remote code execution: July 14, 2015
- Microsoft Security Bulletin MS16-017 - Important
- MS12-020: Vulnerabilities in Remote Desktop could allow remote code execution: March 13, 2012
- Microsoft Security Bulletin MS16-007 - Important
- Remote Desktop Services overview in Windows Server