Lucene search

K
mscveMicrosoftMS:CVE-2020-0734
HistoryFeb 11, 2020 - 8:00 a.m.

Remote Desktop Client Remote Code Execution Vulnerability

2020-02-1108:00:00
Microsoft
msrc.microsoft.com
11

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.047

Percentile

92.6%

A remote code execution vulnerability exists in the Windows Remote Desktop Client when a user connects to a malicious server. An attacker who successfully exploited this vulnerability could execute arbitrary code on the computer of the connecting client. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

To exploit this vulnerability, an attacker would need to have control of a server and then convince a user to connect to it. An attacker would have no way of forcing a user to connect to the malicious server, they would need to trick the user into connecting via social engineering, DNS poisoning or using a Man in the Middle (MITM) technique. An attacker could also compromise a legitimate server, host malicious code on it, and wait for the user to connect.

The update addresses the vulnerability by correcting how the Windows Remote Desktop Client handles connection requests.

Affected configurations

Vulners
Node
microsoftwindows_server\,_version_1909Range<2020-Feb
OR
microsoftwindows_10_1909_for_arm64-based_systemsRange<2020-Feb
OR
microsoftwindows_10_1909_for_x64-based_systemsRange<2020-Feb
OR
microsoftwindows_10_1909_for_32-bit_systemsRange<2020-Feb
OR
microsoftwindows_server_2012Range<2020-Febr2
OR
microsoftwindows_server_2012Range<2020-Febr2
OR
microsoftwindows_server\,_1803_\(server_core_installation\)Range<2020-Feb
OR
microsoftwindows_10_1803_for_x64-based_systemsRange<2020-Feb
OR
microsoftwindows_10_1803_for_32-bit_systemsRange<2020-Feb
OR
microsoftwindows_server_2012Range<2020-Febr2
OR
microsoftwindows_server_2012Range<2020-Febr2
OR
microsoftwindows_server\,_1803_\(server_core_installation\)Range<2020-Feb
OR
microsoftwindows_server\,_1803_\(server_core_installation\)Range<2020-Feb
OR
microsoftwindows_server_2012Range<2020-Feb
OR
microsoftwindows_server_2012Range<2020-Feb
OR
microsoftwindows_server_2008Range<2020-Febr2x64
OR
microsoftwindows_server_2008Range<2020-Febr2x64
OR
microsoftwindows_server_2008Range<2020-Febr2x64
OR
microsoftwindows_server_2008Range<2020-Febr2x64
OR
microsoftwindows_rt_8.1Range<2020-Feb
OR
microsoftwindows_10_1903_for_x64-based_systemsRange<2020-Feb
OR
microsoftwindows_10_1903_for_x64-based_systemsRange<2020-Feb
OR
microsoftwindows_10_2004_for_32-bit_systemsRange<2020-Feb
OR
microsoftwindows_10_2004_for_32-bit_systemsRange<2020-Feb
OR
microsoftwindows_10_1903_for_x64-based_systemsRange<2020-Feb
OR
microsoftwindows_10_1903_for_x64-based_systemsRange<2020-Feb
OR
microsoftwindows_10_2004_for_32-bit_systemsRange<2020-Feb
OR
microsoftwindows_10_2004_for_32-bit_systemsRange<2020-Feb
OR
microsoftwindows_server\,_1803_\(server_core_installation\)Range<2020-Feb
OR
microsoftwindows_server_2016Range<2020-Feb
OR
microsoftwindows_defender_on_windows_10_1607_for_x64-based_systemsRange<2020-Feb
OR
microsoftwindows_defender_on_windows_10_1607_for_32-bit_systemsRange<2020-Feb
OR
microsoftwindows_10_1903_for_x64-based_systemsRange<2020-Feb
OR
microsoftwindows_10_2004_for_32-bit_systemsRange<2020-Feb
OR
microsoftwindows_server\,_version_1903Range<2020-Feb
OR
microsoftwindows_10_1903_for_arm64-based_systemsRange<2020-Feb
OR
microsoftwindows_10_1903_for_x64-based_systemsRange<2020-Feb
OR
microsoftwindows_10_1903_for_32-bit_systemsRange<2020-Feb
OR
microsoftwindows_10_1709_for_arm64-based_systemsRange<2020-Feb
OR
microsoftwindows_10_1709_for_x64-based_systemsRange<2020-Feb
OR
microsoftwindows_10_1709_for_32-bit_systemsRange<2020-Feb
OR
microsoftwindows_server\,_1803_\(server_core_installation\)Range<2020-Feb
OR
microsoftwindows_server_2019Range<2020-Feb
OR
microsoftwindows_10_1809_for_arm64-based_systemsRange<2020-Feb
OR
microsoftwindows_10_1809_for_x64-based_systemsRange<2020-Feb
OR
microsoftwindows_10_1809_for_32-bit_systemsRange<2020-Feb
OR
microsoftwindows_10_1803_for_arm64-based_systemsRange<2020-Feb

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.047

Percentile

92.6%