Choose a country or area to see content specific to your location
-
PRODUCTS AND SERVICES
-
Oscilloscopes
-
Analyzers
- Spectrum Analyzers (Signal Analyzers)
- Network Analyzers
- Logic Analyzers
- Protocol Analyzers and Exercisers
- Bit Error Ratio Testers
- Noise Figure Analyzers and Noise Sources
- High-Speed Digitizers and Multichannel DAQ Solutions
- AC Power Analyzers
- DC Power Analyzers
- Materials Test Equipment
- Device Current Waveform Analyzers
- Parameter / Device Analyzers and Curve Tracers
-
Meters
-
Generators, Sources, and Power Supplies
-
Software
-
Wireless
-
Modular Instruments
-
Network Test and Security
-
Network Visibility
-
Services
- KeysightCare Service and Support
- KeysightAccess Service
- Calibration Services | Global Calibration Services
- Repair Services
- Technology Refresh Services
- Test as a Service — TaaS
- Network / Security Services
- Consulting Services
- Financial Services
- Education Services
- Keysight Support Portal
- Used Equipment
- All Services
-
Additional Products
- All Products, Software, Services
-
-
Solutions
-
Explore by Use Case
Explore by Industry
- All Solutions
- Learn
- Buy
- Support
What are you looking for?
Microsoft Remote Code Execution Vulnerability (CVE-2019-1181/1182)
August 15, 2019
On August 13, 2019, Microsoft released a set of fixes for Remote Desktop Services that include two critical Remote Code Execution (RCE) vulnerabilities, CVE-2019-1181 and CVE-2019-1182. Like the previously-fixed ‘BlueKeep’ vulnerability (CVE-2019-0708), these two vulnerabilities are also ‘wormable’, meaning that any future malware that exploits these could propagate from vulnerable computer to vulnerable computer without user interaction. This vulnerability could impact Keysight products that use Windows 7, Windows Embedded Standard 7 (WES7), Windows 10 or Windows 10 IoT Enterprise 2016 LTSB operating systems. A Service Bulletin with more information on the vulnerability is available from Microsoft.
As of August 15, 2019, Keysight is unaware of any active exploits of this vulnerability, but as a precaution, is strongly recommending that all Windows 7, WES7, Windows 10 or Windows 10 IoT Enterprise 2016 LTSB based products be updated with the latest Microsoft security patches. Updates can be performed using the Windows Update capability found on your product, or by downloading the appropriate update directly from the Microsoft Security Update Guide and installing the update manually.
For additional questions, please contact Keysight.
Want help or have questions?
- © Keysight Technologies 2000–2023
- Privacy
- Sitemap
- Terms
- Trademark Acknowledgements
- Feedback