CVE-2019-0708 Explained: BlueKeep, the Wormable RDP Vulnerability in Legacy Windows
A pre-authentication remote code execution vulnerability in Windows Remote Desktop Services requiring no credentials and no user interaction. Over one million internet-facing systems remained unpatched two months after disclosure.

Founder & Cybersecurity Evangelist
CVE-2019-0708, named BlueKeep, is a pre-authentication remote code execution vulnerability in Windows Remote Desktop Services. Patched on May 14, 2019, Microsoft took the unusual step of releasing patches for Windows XP and Server 2003 — long out of support — given the catastrophic potential of a wormable exploit targeting RDP.
The NSA publicly warned about BlueKeep in June 2019. Over one million internet-facing systems remained unpatched two months after the patch was available. The vulnerability is wormable: an exploit can self-propagate from vulnerable system to vulnerable system without credentials or user interaction — exactly as EternalBlue powered WannaCry.
BlueKeep exploits a use-after-free vulnerability in the RDP kernel driver during the pre-authentication phase. An attacker can send specially crafted RDP packets to port 3389 and achieve code execution with SYSTEM privileges with no credentials, no account, and no user interaction required.
Technical Details: How CVE-2019-0708 Works
Remote Desktop Protocol establishes a connection through an initial X.224 connection request followed by a Microsoft Data Protocol (MCS) Tier phase. During the pre-authentication phase — before any credentials are verified — the RDP kernel driver (termdd.sys) processes Channel requests.
BlueKeep exploits a use-after-free vulnerability in the handling of certain RDP channel operations. The kernel driver allocates memory for channel objects and, under specific conditions triggered by malformed channel binding requests, the memory is freed and then accessed again. An attacker who controls the timing and content of subsequent allocations can place malicious data in the freed memory region, redirecting control flow to attacker-controlled shellcode executing at kernel level with SYSTEM privileges.
Connect to RDP Port 3389
Attacker establishes a TCP connection to the target on port 3389. No authentication is required — the vulnerability exists in the pre-authentication phase of the RDP handshake.
Send Malformed Channel Request
Attacker sends specially crafted RDP pre-authentication packets triggering the use-after-free condition in the termdd.sys kernel driver.
Kernel Memory Corruption
The freed memory is reallocated with attacker-controlled content, enabling control of a kernel object pointer.
Kernel-Level Code Execution
Attacker redirects execution to shellcode running in kernel context with SYSTEM privileges — full control of the machine with no prior authentication.
Worm-Like Lateral Movement
Compromised system scans for additional vulnerable RDP hosts on the network and repeats the exploit — enabling self-propagation without credentials.
Affected Versions
CVE-2019-0708 affects: Windows XP SP3, Windows XP Professional SP2 (x64), Windows Vista, Windows 7, Windows Server 2003 SP2, Windows Server 2008, and Windows Server 2008 R2.
Windows 8, 8.1, 10, Server 2012, 2012 R2, 2016, and 2019 are NOT affected. These versions use Network Level Authentication (NLA) by default, which requires credentials before establishing an RDP session — blocking the pre-authentication exploit path. However, NLA disabled on newer Windows versions would restore a vulnerable code path.
Mitigation and Patch Guidance for BlueKeep
The definitive fix is applying the May 2019 security updates. For legacy systems that cannot be immediately patched, the following mitigations substantially reduce the risk of exploitation.
Apply the May 2019 Security Update
Microsoft released patches for Windows 7, Server 2008, and Server 2008 R2 via Windows Update. Separate out-of-band patches for XP and Server 2003 are available on the Microsoft Update Catalog.
Enable Network Level Authentication (NLA)
NLA requires authentication before an RDP session is established, preventing unauthenticated exploitation. Enable via: System Properties > Remote > 'Allow connections only from computers running Remote Desktop with Network Level Authentication.'
Block port 3389 at the internet perimeter
RDP should never be directly exposed to the internet. Place all RDP access behind a VPN gateway or bastion host with multi-factor authentication before the RDP hop.
Disable RDP on systems that do not require it
Disable Remote Desktop entirely on all servers and workstations that don't require it: System Properties > Remote > 'Don't allow remote connections to this computer.'
The bottom line
BlueKeep was the EternalBlue of 2019 — a wormable, pre-auth RCE in a default-enabled Windows service, with over a million internet-exposed systems and nation-state actors racing to weaponize it. While BlueKeep never triggered a WannaCry-scale event, active exploitation was confirmed in the wild by November 2019. Any Windows 7 or Server 2008 system with RDP exposed without the May 2019 patch is an open door. Patch, enable NLA, and remove RDP from the public internet.
Get threat intel before your inbox does.
50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.
Unsubscribe anytime. We never sell your data.

Founder & Cybersecurity Evangelist, Decryption Digest
Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.