9.8
CVSSv3

CVE-2020-0609

Published: 14/01/2020 Updated: 21/07/2021
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 892
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

An unauthenticated remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability requires no user interaction. An attacker could execute arbitrary code on the target system then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems RD Gateway via RDP. The update addresses the vulnerability by correcting how RD Gateway handles connection requests. This CVE ID is unique from CVE-2020-0610.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows server 2012 -

microsoft windows server 2012 r2

microsoft windows server 2016 -

microsoft windows server 2019 -

Github Repositories

A proof-of-concept scanner to check an RDG Gateway Server for vulnerabilities CVE-2020-0609 & CVE-2020-0610.

Scanner for CVE-2020-0609 & CVE-2020-0610 A proof-of-concept scanner to check an RDP Gateway Server for vulnerabilities CVE-2020-0609 & CVE-2020-0610 Tested on: Windows Server 2012 x64 Windows Server 2016 x64 Windows Server 2019 x64 Disclaimer Scanning for memory corruption vulnerabilities is dangerous and can potentially crash systems Whilst this tool has b

👋 Looks like you've found my profile! Enjoy your stay (and don't take me too serious ^_^)! 💣 I'm a reverse engineer and software engineer that mostly dabbles around in Rust, C++ and various Assembly languages 👹 I spend most of my free time working on low-level projects such as but not limited to reverse engineering software (malware, anti cheats, games,

Scanning for Remote Desktop Gateways (Potentially unpatched CVE-2020-0609 and CVE-2020-0610)

Scanning for Remote Desktop Gateways (Potentially unpatched CVE-2020-0609 and CVE-2020-0610) The scanner has 2 modes of operation: Check for systems vulnerable to CVE-2020-0609 on UDP 3391 Uses the vuln scan code of githubcom/MalwareTech/RDGScanner Disclaimer Scanning for memory corruption vulnerabilities is dangerous and can potentially crash systems Whilst this tool

PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610

BlueGate PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610 Thanks to ollypwn for pointing out my silly mistake! Setup I'm using a patched version of pydtls as the original repository wouldn't build properly cd pydtls sudo python setuppy install Denial of Service A PoC for the DoS attack

Scanner for Zyxel products which are potentially vulnerable due to an undocumented user account (CVE-2020-29583)

Scanner for Zyxel products which are vulnerable due to an undocumented user account (CVE-2020-29583) Vuln details: wwweyecontrolnl/blog/undocumented-user-account-in-zyxel-productshtml (But I'm not sure if it's really possible to login with zyfwp via the web interface? Any reports would be appreciated Also the link to the "full list of affected devices

This repository is my own list of tools / useful stuff for pentest, defensive activities, programming, lockpicking and physical security

Infosec Useful Stuff This repository is my own list of tools / useful stuff for pentest, defensive activities, programming, lockpicking and physical security (all resources are in English only) If you want to add something you can ask a pull request or send me the link on @Sh0ckFR ;) Menu Reverse Engineering / Pown Open Source Intelligence Pentesting Social Engineering / Phish

PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE

BlueGate Proof of Concept (Denial of Service + scanner) for CVE-2020-0609 and CVE-2020-0610 These vulnerabilities allows an unauthenticated attacker to gain remote code execution with highest privileges via RD Gateway for RDP Please use for research and educational purpose only Usage Make sure you have pyOpenSSL installed for python3 usage: BlueGatepy [-h] -M {check,dos} [

Recent Articles

Microsoft Patch Tuesday – January 2020
Symantec Threat Intelligence Blog • Preethi Koroth • 15 Jan 2024

This month the vendor has patched 49 vulnerabilities, 8 of which are rated Critical.

Posted: 15 Jan, 202014 Min ReadThreat Intelligence SubscribeMicrosoft Patch Tuesday – January 2020This month the vendor has patched 49 vulnerabilities, 8 of which are rated Critical.This month the vendor has patched 49 vulnerabilities, 8 of which are rated Critical. As always, customers are advised to follow these security best practices: Install vendor patches as soon as they are available. Run all software with the least privileges required wh...

IT threat evolution Q1 2020. Statistics
Securelist • Victor Chebyshev Fedor Sinitsyn Denis Parinov Oleg Kupreev Evgeny Lopatin Alexey Kulaev • 20 May 2020

These statistics are based on detection verdicts for Kaspersky products received from users who consented to providing statistical data. According to Kaspersky Security Network, Q1 2020 will be remembered primarily for the coronavirus pandemic and cybercriminals’ exploitation of the topic. In particular, the creators of a new modification of the Ginp banking trojan renamed their malware Coronavirus Finder and then began offering it for €0.75 disguised as an app supposedly capable of detectin...

Teenagers today. Can't take them anywhere, eh? 18-year-old kid accused of $50m SIM-swap cryptocurrency heist
The Register • Shaun Nichols in San Francisco • 25 Jan 2020

Also, Cisco, Citrix emit patches, US army advises using Signal

Roundup Here comes a summary of this week's computer security news beyond what we've already covered. An 18-year-old man from Canada has been accused of stealing more than $50m in cryptocurrency using SIM-swapping attacks. SIM swapping typically involves crooks tricking cellular network support staff to transfer victims' smartphone numbers to the criminals' own SIMs, and then using those numbers to reset passwords, or get two-factor authentication tokens, via text messages, and ultimately access...

Welcome to the 2020s: Booby-trapped Office files, NSA tipping off Windows cert-spoofing bugs, RDP flaws...
The Register • Shaun Nichols in San Francisco • 14 Jan 2020

Grab your Microsoft, Adobe, SAP, Intel, and VMware fixes now The four problems with the US government's latest rulebook on security bug disclosures

Patch Tuesday In the first Patch Tuesday of the year, Microsoft finds itself joined by Adobe, Intel, VMware, and SAP in dropping scheduled security updates. This month's Microsoft security fixes include three more remote-code-execution vulnerabilities in Redmond's Windows Remote Desktop Protocol software. Two of the flaws (CVE-2020-0609, CVE-2020-0610) are present on the server side in RD Gateway – requiring no authentication – while a third (CVE-2020-0611) is found on the client side. Dusti...