Описание
Remote Desktop Client Remote Code Execution Vulnerability
FAQ
How would an attacker exploit this vulnerability?
An attacker would have to convince a targeted user to connect to a malicious RDP server. Upon connecting, the malicious server could execute code on the victim's system in the context of the targeted user.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Remote Desktop client for Windows Desktop | ||
Windows Server 2022 | ||
Windows Server 2022 (Server Core installation) | ||
Windows 11 version 21H2 for x64-based Systems | ||
Windows 11 version 21H2 for ARM64-based Systems |
Показывать по
10
Возможность эксплуатации
Publicly Disclosed
No
Exploited
No
Latest Software Release
Exploitation More Likely
Older Software Release
Exploitation More Likely
DOS
N/A
EPSS
Процентиль: 97%
0.35446
Средний
8.8 High
CVSS3
Связанные уязвимости
CVSS3: 8.8
nvd
около 3 лет назад
Remote Desktop Client Remote Code Execution Vulnerability
CVSS3: 8.8
github
около 3 лет назад
Remote Desktop Client Remote Code Execution Vulnerability.
CVSS3: 8.8
fstec
около 3 лет назад
Уязвимость протокола Remote Desktop Protocol Client операционной системы Windows, позволяющая нарушителю выполнить произвольный код
EPSS
Процентиль: 97%
0.35446
Средний
8.8 High
CVSS3