Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2021-34535

Опубликовано: 10 авг. 2021
Источник: msrc
CVSS3: 8.8
EPSS Низкий

Описание

Remote Desktop Client Remote Code Execution Vulnerability

FAQ

How could an attacker exploit this vulnerability?

In the case of a Remote Desktop connection, an attacker with control of a Remote Desktop Server could trigger a remote code execution (RCE) on the machine when a victim connects to the attacking server with the vulnerable Remote Desktop Client.

In the case of Hyper-V, a malicious program running in a guest VM could trigger guest-to-host RCE by exploiting this vulnerability in the Hyper-V Viewer when a victim running on the host connects to the attacking Hyper-V guest.

Обновления

ПродуктСтатьяОбновление
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2012
Windows 8.1 for 32-bit systems
Windows 8.1 for x64-based systems
Windows Server 2012 R2
Windows RT 8.1
-
Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation More Likely

Older Software Release

Exploitation More Likely

DOS

N/A

EPSS

Процентиль: 86%
0.02976
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
почти 4 года назад

Remote Desktop Client Remote Code Execution Vulnerability

CVSS3: 8.8
github
около 3 лет назад

Remote Desktop Client Remote Code Execution Vulnerability

CVSS3: 8.8
fstec
почти 4 года назад

Уязвимость клиента удаленного рабочего стола Remote Desktop Client операционных систем Microsoft Windows, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 86%
0.02976
Низкий

8.8 High

CVSS3