A few days ago, patches were released for Windows systems that are outside Microsoft's support period (Microsoft Customer Guidance for CVE-2019-0708), which must be downloaded and installed, as they are not propagated automatically.
Error regarding unauthorized access via RDP to systems (NIST CVE-2019-0708 Detail) was probably already known last year, while information on how to use it was traded (Удаленное выполнение произвольного кода в протоколе RDP).
A network scan reveals a number of RDP-enabled systems on the Internet, some of which are Windows 7 and even Windows XP systems that are vulnerable (SiriusBugHunt CVE-2019-0708). The disturbing aspect of the vulnerability is that it can be exploited without involving an operator, so it is suitable for automated attacks.
Those who still have old RDP-enabled systems on their networks should apply the published patches as soon as possible and consider replacing such systems with better protected ones.