A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems Remote Desktop Service via RDP. The update addresses the vulnerability by correcting how Remote Desktop Services handles connection requests.
- https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-rdpbcgr
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708
- https://github.com/FreeRDP/FreeRDP
- https://github.com/citronneur/rdpy
- https://github.com/rdesktop/rdesktop
- https://github.com/SecureAuthCorp/impacket/
usage: python3 poc.py -f ips.txt
- Suggest a feature
- Report a bug
- Fixing Issues
Licensed under the GNU GPLv3, see LICENSE for more information.