Описание
Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
FAQ
According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?
Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.
Обновления
| Продукт | Статья | Обновление |
|---|---|---|
| Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | ||
| Windows Server 2008 R2 for x64-based Systems Service Pack 1 | ||
| Windows Server 2012 | ||
| Windows Server 2012 (Server Core installation) | ||
| Windows Server 2012 R2 | ||
| Windows Server 2012 R2 (Server Core installation) | ||
| Windows Server 2016 | ||
| Windows Server 2016 (Server Core installation) | ||
| Windows Server 2019 | ||
| Windows Server 2019 (Server Core installation) |
Показывать по
10
Возможность эксплуатации
Publicly Disclosed
No
Exploited
No
Latest Software Release
Exploitation Less Likely
DOS
N/A
EPSS
Процентиль: 88%
0.0409
Низкий
8.8 High
CVSS3
Связанные уязвимости
CVSS3: 8.8
nvd
около 1 года назад
Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
CVSS3: 8.8
github
около 1 года назад
Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
CVSS3: 8.8
fstec
около 1 года назад
Уязвимость службы Remote Desktop Licensing Service операционных систем Windows, позволяющая выполнить произвольный код
EPSS
Процентиль: 88%
0.0409
Низкий
8.8 High
CVSS3