Choose a country or area to see content specific to your location
Confirm your country to access relevant pricing, special offers, events, and contact information.
PRODUCTS AND SERVICES
- Spectrum Analyzers (Signal Analyzers)
- Network Analyzers
- Logic Analyzers
- Protocol Analyzers and Exercisers
- Bit Error Ratio Testers
- Noise Figure Analyzers and Noise Sources
- High-Speed Digitizers and Multichannel DAQ Solutions
- AC Power Analyzers
- DC Power Analyzers
- Materials Test Equipment
- Device Current Waveform Analyzers
- Parameter / Device Analyzers and Curve Tracers
- Generators, Sources, and Power Supplies
- Modular Instruments
- Network Test and Security
- Network Visibility
- Additional Products
- All Products, Software, Services
Updated: July 17, 2019
On May 14, 2019, Microsoft announced and released fixes for a Remote Code Execution vulnerability (CVE-2019-0708) in Remote Desktop Services, formerly known as Terminal Services, in some of its older operating systems. This vulnerability could impact Keysight products that use Windows 7, Windows Embedded Standard 7 (WES7), or Windows XP operating systems. The vulnerability does not exist in products using a Windows 10 based operating system. More information on the vulnerability is available from Microsoft at Prevent a worm by updating Remote Desktop Services (CVE2019-0708).
As of July 17, 2019, Keysight is unaware of any active exploits of this vulnerability, but as a precaution, is strongly recommending that all Windows 7, WES7, and Windows XP based products be updated with the latest Microsoft security patches. Updates for Windows 7 and WES7 products can be performed using the Windows Update capability found on your instrument, or by downloading the appropriate update directly from the Windows 7 Microsoft Update Catalog page and installing the patch manually. For Windows XP products, the update must be downloaded and installed manually from the Windows XP Microsoft Update Catalog page.
For additional questions, please contact Keysight.