Описание
Remote Desktop Client Remote Code Execution Vulnerability
FAQ
How could an attacker exploit this vulnerability?
In the case of a Remote Desktop connection, an attacker with control of a Remote Desktop Server could trigger a remote code execution (RCE) on the RDP client machine when a victim connects to the attacking server with the vulnerable Remote Desktop Client.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | ||
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | ||
Windows Server 2012 | ||
Windows Server 2012 (Server Core installation) | ||
Windows Server 2012 R2 | ||
Windows Server 2012 R2 (Server Core installation) | ||
Windows 10 for 32-bit Systems | ||
Windows 10 for x64-based Systems | ||
Windows Server 2016 | ||
Windows 10 Version 1607 for 32-bit Systems |
Показывать по
10
Возможность эксплуатации
Publicly Disclosed
No
Exploited
No
Latest Software Release
Exploitation Less Likely
DOS
N/A
EPSS
Процентиль: 87%
0.03423
Низкий
8.8 High
CVSS3
Связанные уязвимости
CVSS3: 8.8
github
8 месяцев назад
Remote Desktop Client Remote Code Execution Vulnerability
CVSS3: 8.8
fstec
8 месяцев назад
Уязвимость клиента удаленного рабочего стола Remote Desktop Protocol (RDP) Client операционных систем Windows, позволяющая нарушителю выполнить произвольный код
EPSS
Процентиль: 87%
0.03423
Низкий
8.8 High
CVSS3