Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f7vq-648f-8pfh

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Remote Desktop Protocol (RDP) implementation in Microsoft Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 does not properly encrypt sessions, which makes it easier for man-in-the-middle attackers to obtain sensitive information by sniffing the network or modify session content by sending crafted RDP packets, aka "RDP MAC Vulnerability."

The Remote Desktop Protocol (RDP) implementation in Microsoft Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 does not properly encrypt sessions, which makes it easier for man-in-the-middle attackers to obtain sensitive information by sniffing the network or modify session content by sending crafted RDP packets, aka "RDP MAC Vulnerability."

EPSS

Процентиль: 96%
0.27005
Средний

Связанные уязвимости

nvd
около 11 лет назад

The Remote Desktop Protocol (RDP) implementation in Microsoft Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 does not properly encrypt sessions, which makes it easier for man-in-the-middle attackers to obtain sensitive information by sniffing the network or modify session content by sending crafted RDP packets, aka "RDP MAC Vulnerability."

fstec
около 11 лет назад

Уязвимость операционной системы Windows, позволяющая злоумышленнику изменить информацию, передаваемую в рамках RDP-сессии

EPSS

Процентиль: 96%
0.27005
Средний