Описание
Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability
FAQ
How could an attacker exploit the vulnerability?
An unauthenticated attacker could exploit the vulnerability by connecting to a Remote Desktop server and then sending a malicious http request to the server.
According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to win a race condition.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Windows Server 2012 | ||
Windows Server 2012 (Server Core installation) | ||
Windows Server 2012 R2 | ||
Windows Server 2012 R2 (Server Core installation) | ||
Windows Server 2016 | ||
Windows Server 2016 (Server Core installation) | ||
Windows Server 2019 | ||
Windows Server 2019 (Server Core installation) | ||
Windows Server 2022 | ||
Windows Server 2022 (Server Core installation) |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
DOS
EPSS
7.5 High
CVSS3
Связанные уязвимости
Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability
Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability
Уязвимость шлюза удалённых рабочих столов Remote Desktop Gateway (RD Gateway) операционных систем Windows, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
7.5 High
CVSS3