<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Potential MS Windows Security Vulnerability CVE-2019-0708 in Application Development and Automation Discussions</title>
    <link>https://community.sap.com/t5/application-development-and-automation-discussions/potential-ms-windows-security-vulnerability-cve-2019-0708/m-p/11953681#M1966682</link>
    <description>&lt;P&gt; &lt;/P&gt;
  &lt;P&gt;REGARDING: Potential MS Windows Security Vulnerability - How is SAP Addressiung this?&lt;/P&gt;
  &lt;P&gt; &lt;/P&gt;
  &lt;P&gt;Reports from our Security Ratings vendor, RiskRecon, indicate that you may have systems exposed to the internet that have the “BlueKeep” CVE-2019-0708 vulnerability.Details regarding the potential vulnerability follow.&lt;/P&gt;
  &lt;P&gt; &lt;/P&gt;
  &lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Issue&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
  &lt;P&gt; &lt;/P&gt;
  &lt;P&gt;On May 14, 2019, Microsoft announced a critical Remote Code Execution vulnerability (CVE-2019-0708) in the Remote Desktop Protocol (RDP) service of older versions of Windows. Per Microsoft, “The vulnerability is 'wormable,' and future malware that exploits this vulnerability could propagate from vulnerable computer to vulnerable computer in a way much like the WannaCry malware spread across the globe in 2017.” Microsoft has taken the unusual step of releasing a patch for versions that it no longer supports and on June 4&lt;SUP&gt;th&lt;/SUP&gt; the NSA released an advisory to patch this vulnerability due to the potential for significant business disruption. &lt;/P&gt;
  &lt;P&gt; &lt;/P&gt;
  &lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Actionable Information&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
  &lt;P&gt; &lt;/P&gt;
  &lt;P&gt;The information in red font below provides additional information regarding hosts that appear that could be vulnerable. Please review and assess this information and respond back to us as soon as possible (by June 19&lt;SUP&gt;th&lt;/SUP&gt;) to let us know if this vulnerability could impact E*TRADE services or if action has been taken to patch this vulnerability. &lt;/P&gt;
  &lt;P&gt; &lt;/P&gt;
  &lt;P&gt;Note: RiskRecon is only able to tell us where RDP is running – not whether it has been patched or associated with a non-vulnerable system, so ideally some of the vendors are not impacted by this vulnerability.&lt;/P&gt;
  &lt;P&gt; &lt;STRONG&gt;SAP Ariba, Inc.&lt;/STRONG&gt; &lt;STRONG&gt;130.211.37.0&lt;/STRONG&gt;gadgets-jam801.sapjam.comjam801.sapjam.comwww.gadgets-jam801.sapjam.com &lt;STRONG&gt;18.194.176.223&lt;/STRONG&gt;answers.sap.com&lt;/P&gt;</description>
    <pubDate>Fri, 21 Jun 2019 16:09:32 GMT</pubDate>
    <dc:creator>josephgomez</dc:creator>
    <dc:date>2019-06-21T16:09:32Z</dc:date>
    <item>
      <title>Potential MS Windows Security Vulnerability CVE-2019-0708</title>
      <link>https://community.sap.com/t5/application-development-and-automation-discussions/potential-ms-windows-security-vulnerability-cve-2019-0708/m-p/11953681#M1966682</link>
      <description>&lt;P&gt; &lt;/P&gt;
  &lt;P&gt;REGARDING: Potential MS Windows Security Vulnerability - How is SAP Addressiung this?&lt;/P&gt;
  &lt;P&gt; &lt;/P&gt;
  &lt;P&gt;Reports from our Security Ratings vendor, RiskRecon, indicate that you may have systems exposed to the internet that have the “BlueKeep” CVE-2019-0708 vulnerability.Details regarding the potential vulnerability follow.&lt;/P&gt;
  &lt;P&gt; &lt;/P&gt;
  &lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Issue&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
  &lt;P&gt; &lt;/P&gt;
  &lt;P&gt;On May 14, 2019, Microsoft announced a critical Remote Code Execution vulnerability (CVE-2019-0708) in the Remote Desktop Protocol (RDP) service of older versions of Windows. Per Microsoft, “The vulnerability is 'wormable,' and future malware that exploits this vulnerability could propagate from vulnerable computer to vulnerable computer in a way much like the WannaCry malware spread across the globe in 2017.” Microsoft has taken the unusual step of releasing a patch for versions that it no longer supports and on June 4&lt;SUP&gt;th&lt;/SUP&gt; the NSA released an advisory to patch this vulnerability due to the potential for significant business disruption. &lt;/P&gt;
  &lt;P&gt; &lt;/P&gt;
  &lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Actionable Information&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
  &lt;P&gt; &lt;/P&gt;
  &lt;P&gt;The information in red font below provides additional information regarding hosts that appear that could be vulnerable. Please review and assess this information and respond back to us as soon as possible (by June 19&lt;SUP&gt;th&lt;/SUP&gt;) to let us know if this vulnerability could impact E*TRADE services or if action has been taken to patch this vulnerability. &lt;/P&gt;
  &lt;P&gt; &lt;/P&gt;
  &lt;P&gt;Note: RiskRecon is only able to tell us where RDP is running – not whether it has been patched or associated with a non-vulnerable system, so ideally some of the vendors are not impacted by this vulnerability.&lt;/P&gt;
  &lt;P&gt; &lt;STRONG&gt;SAP Ariba, Inc.&lt;/STRONG&gt; &lt;STRONG&gt;130.211.37.0&lt;/STRONG&gt;gadgets-jam801.sapjam.comjam801.sapjam.comwww.gadgets-jam801.sapjam.com &lt;STRONG&gt;18.194.176.223&lt;/STRONG&gt;answers.sap.com&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jun 2019 16:09:32 GMT</pubDate>
      <guid>https://community.sap.com/t5/application-development-and-automation-discussions/potential-ms-windows-security-vulnerability-cve-2019-0708/m-p/11953681#M1966682</guid>
      <dc:creator>josephgomez</dc:creator>
      <dc:date>2019-06-21T16:09:32Z</dc:date>
    </item>
  </channel>
</rss>

