Описание
Remote Desktop Client Remote Code Execution Vulnerability
Меры по смягчению последствий
The following mitigation may be helpful in your situation. In all cases, Microsoft strongly recommends that you install the updates for this vulnerability as soon as possible even if you plan to leave Remote Desktop Services disabled:
1. Disable Remote Desktop Services if they are not required.
If you no longer need these services on your system, consider disabling them as a security best practice. Disabling unused and unneeded services helps reduce your exposure to security vulnerabilities.
FAQ
How could an attacker exploit this vulnerability?
In the case of a Remote Desktop connection, an attacker with control of a Remote Desktop Server could trigger a remote code execution (RCE) on the RDP client machine when a victim connects to the attacking server with the vulnerable Remote Desktop Client.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Remote Desktop client for Windows Desktop | ||
Windows Server 2022 | ||
Windows Server 2022 (Server Core installation) | ||
Windows 11 version 21H2 for x64-based Systems | ||
Windows 11 version 21H2 for ARM64-based Systems | ||
Windows 11 Version 22H2 for ARM64-based Systems | ||
Windows 11 Version 22H2 for x64-based Systems | ||
Windows 11 Version 23H2 for ARM64-based Systems | ||
Windows 11 Version 23H2 for x64-based Systems | ||
Windows Server 2022, 23H2 Edition (Server Core installation) |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
DOS
EPSS
8.8 High
CVSS3
Связанные уязвимости
Remote Desktop Client Remote Code Execution Vulnerability
Уязвимость клиента удаленного рабочего стола Remote Desktop Protocol (RDP) Client операционных систем Windows, позволяющая нарушителю выполнить произвольный код
EPSS
8.8 High
CVSS3