Show filters
252 Total Results
Displaying 1-10 of 252
Sort by:
Attacker Value
Very High
Windows Remote Desktop (RDP) Use-after-free vulnerablility, "Bluekeep"
Disclosure Date: May 16, 2019 (last updated September 02, 2020)
A bug in Windows Remote Desktop protocol allows unauthenticated users to run arbitrary code via a specially crafted request to the service. This affects Windows 7/Windows Server 2008 and earlier releases. Given the ubiquity of RDP in corporate environments and the trusted nature of RDP, this could pose serious concerns for ransomware attacks much like WannaCry.
Patches are released for Windows 7/2008 Operating systems as well as Windows XP.
12
Attacker Value
Very High
Insecure RDP
Last updated October 09, 2020
There are active attack campaigns as of October 2020 targeting RDP servers without multi-factor authentication enabled.
8
Attacker Value
Unknown
CVE-2021-38666
Disclosure Date: November 10, 2021 (last updated January 18, 2024)
Remote Desktop Client Remote Code Execution Vulnerability
3
Attacker Value
Very High
Windows Remote Desktop Gateway RCE (CVE-2020-0609)
Last updated February 24, 2020
A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems RD Gateway via RDP.
The update addresses the vulnerability by correcting how RD Gateway handles connection requests.
(Description copy-pasted entirely from Microsoft's CVE description)
1
Attacker Value
Unknown
CVE-2024-21307
Disclosure Date: January 09, 2024 (last updated May 28, 2024)
Remote Desktop Client Remote Code Execution Vulnerability
3
Attacker Value
Very High
DejaBlue, RDP Heap Overflow
Disclosure Date: August 14, 2019 (last updated January 19, 2024)
A remote code execution vulnerability exists in Microsoft Dynamics 365 for Finance and Operations (on-premises) version 10.0.11. An attacker who successfully exploited this vulnerability could gain remote code execution via server-side script execution on the victim server.
An authenticated attacker with privileges to import and export data could exploit this vulnerability by sending a specially crafted file to a vulnerable Dynamics server.
The security update addresses the vulnerability by correcting how Microsoft Dynamics 365 for Finance and Operations (on-premises) version 10.0.11 handles user input.
3
Attacker Value
Unknown
CVE-2024-38077
Disclosure Date: July 09, 2024 (last updated July 13, 2024)
Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
2
Attacker Value
Unknown
CVE-2020-16896
Disclosure Date: October 16, 2020 (last updated January 01, 2024)
<p>An information disclosure vulnerability exists in Remote Desktop Protocol (RDP) when an attacker connects to the target system using RDP and sends specially crafted requests. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.</p>
<p>To exploit this vulnerability, an attacker would need to run a specially crafted application against a server which provides Remote Desktop Protocol (RDP) services.</p>
<p>The update addresses the vulnerability by correcting how RDP handles connection requests.</p>
1
Attacker Value
Moderate
Remote Desktop Client remote code execution vulnerability
Disclosure Date: January 14, 2020 (last updated October 06, 2023)
A remote code execution vulnerability exists in the Windows Remote Desktop Client when a user connects to a malicious server, aka 'Remote Desktop Client Remote Code Execution Vulnerability'.
0
Attacker Value
Very High
CVE-2012-0002
Disclosure Date: March 13, 2012 (last updated December 08, 2023)
The Remote Desktop Protocol (RDP) implementation in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly process packets in memory, which allows remote attackers to execute arbitrary code by sending crafted RDP packets triggering access to an object that (1) was not properly initialized or (2) is deleted, aka "Remote Desktop Protocol Vulnerability."
0