Описание
Remote Desktop Protocol Remote Code Execution Vulnerability
FAQ
How would an attacker exploit this vulnerability?
An attacker would have to convince a targeted user to connect to a malicious RDP server. Upon connecting, the malicious server could read or tamper with clipboard contents and the victim's filesystem contents.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Windows 7 for 32-bit Systems Service Pack 1 | ||
Windows 7 for x64-based Systems Service Pack 1 | ||
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | ||
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | ||
Windows Server 2012 | ||
Windows Server 2012 (Server Core installation) | ||
Windows 8.1 for 32-bit systems | ||
Windows 8.1 for x64-based systems | ||
Windows Server 2012 R2 | ||
Windows RT 8.1 | - |
Показывать по
10
Возможность эксплуатации
Publicly Disclosed
No
Exploited
No
Latest Software Release
Exploitation Less Likely
Older Software Release
Exploitation Less Likely
DOS
N/A
EPSS
Процентиль: 87%
0.03594
Низкий
8 High
CVSS3
Связанные уязвимости
CVSS3: 8
nvd
больше 3 лет назад
Remote Desktop Protocol Remote Code Execution Vulnerability
CVSS3: 8
github
больше 3 лет назад
Remote Desktop Protocol Remote Code Execution Vulnerability.
CVSS3: 8
fstec
больше 3 лет назад
Уязвимость реализации протокола Remote Desktop Protocol операционной системы Microsoft Windows, позволяющая нарушителю выполнить произвольный код
EPSS
Процентиль: 87%
0.03594
Низкий
8 High
CVSS3