Описание
Windows Remote Desktop Security Feature Bypass Vulnerability
FAQ
What security feature is being bypassed?
An attacker with a machine-in-the-middle (MitM) position who successfully exploited this vulnerability could bypass the certificate validation performed when a targeted user connects to a trusted server.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Windows Server 2008 for 32-bit Systems Service Pack 2 | ||
Windows Server 2008 for x64-based Systems Service Pack 2 | ||
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | ||
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | ||
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | ||
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | ||
Windows Server 2012 | ||
Windows Server 2012 (Server Core installation) | ||
Windows Server 2012 R2 | ||
Windows Server 2012 R2 (Server Core installation) |
Показывать по
10
Возможность эксплуатации
Publicly Disclosed
No
Exploited
No
Latest Software Release
Exploitation Less Likely
DOS
N/A
EPSS
Процентиль: 21%
0.00065
Низкий
6.8 Medium
CVSS3
Связанные уязвимости
CVSS3: 6.8
nvd
около 2 лет назад
Windows Remote Desktop Security Feature Bypass Vulnerability
CVSS3: 6.8
github
около 2 лет назад
Windows Remote Desktop Security Feature Bypass Vulnerability
CVSS3: 6.8
fstec
около 2 лет назад
Уязвимость клиента удаленного рабочего стола Remote Desktop Client операционной системы Microsoft Windows, позволяющая нарушителю существующие ограничения безопасности
EPSS
Процентиль: 21%
0.00065
Низкий
6.8 Medium
CVSS3