892
VMScore

CVE-2020-0610

Published: 14/01/2020 Updated: 21/07/2021
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 892
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Microsoft Windows Remote Desktop Gateway (RD Gateway) is a Windows Server component that provides access to Remote Desktop services without requiring the client system to be present on the same network as the target system. Originally launched as Terminal Services Gateway (TS Gateway) with Windows Server 2008, RD Gateway is a recommended way to provide Remote Desktop connectivity to cloud-based systems. For example, guidance has been provided for using RD Gateway with AWS, and also with Azure. The use of RD Gateway is recommended to reduce the attack surface of Windows-based hosts.Microsoft RD Gateway in Windows Server 2012 and later contain two vulnerabilities that can allow an unauthenticated remote malicious user to execute arbitrary code with SYSTEM privileges. It is reported by Kryptos Logic that the flaws lie in handling of fragmentation. This vulnerability is exploitable by connecting to the RD Gateway service listening on UDP/3391.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows server 2012 -

microsoft windows server 2012 r2

microsoft windows server 2016 -

microsoft windows server 2019 -

Github Repositories

A proof-of-concept scanner to check an RDG Gateway Server for vulnerabilities CVE-2020-0609 & CVE-2020-0610.

Scanner for CVE-2020-0609 & CVE-2020-0610 A proof-of-concept scanner to check an RDP Gateway Server for vulnerabilities CVE-2020-0609 & CVE-2020-0610 Tested on: Windows Server 2012 x64 Windows Server 2016 x64 Windows Server 2019 x64 Disclaimer Scanning for memory corruption vulnerabilities is dangerous and can potentially crash systems Whilst this tool has b

👋 Looks like you've found my profile! Enjoy your stay (and don't take me too serious ^_^)! 💣 I'm a reverse engineer and software engineer that mostly dabbles around in Rust, C++ and various Assembly languages 👹 I spend most of my free time working on low-level projects such as but not limited to reverse engineering software (malware, anti cheats, games,

Scanning for Remote Desktop Gateways (Potentially unpatched CVE-2020-0609 and CVE-2020-0610)

Scanning for Remote Desktop Gateways (Potentially unpatched CVE-2020-0609 and CVE-2020-0610) The scanner has 2 modes of operation: Check for systems vulnerable to CVE-2020-0609 on UDP 3391 Uses the vuln scan code of githubcom/MalwareTech/RDGScanner Disclaimer Scanning for memory corruption vulnerabilities is dangerous and can potentially crash systems Whilst this tool

PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610

BlueGate PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610 Thanks to ollypwn for pointing out my silly mistake! Setup I'm using a patched version of pydtls as the original repository wouldn't build properly cd pydtls sudo python setuppy install Denial of Service A PoC for the DoS attack

This repository is my own list of tools / useful stuff for pentest, defensive activities, programming, lockpicking and physical security

Infosec Useful Stuff This repository is my own list of tools / useful stuff for pentest, defensive activities, programming, lockpicking and physical security (all resources are in English only) If you want to add something you can ask a pull request or send me the link on @Sh0ckFR ;) Menu Reverse Engineering / Pown Open Source Intelligence Pentesting Social Engineering / Phish

PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE

BlueGate Proof of Concept (Denial of Service + scanner) for CVE-2020-0609 and CVE-2020-0610 These vulnerabilities allows an unauthenticated attacker to gain remote code execution with highest privileges via RD Gateway for RDP Please use for research and educational purpose only Usage Make sure you have pyOpenSSL installed for python3 usage: BlueGatepy [-h] -M {check,dos} [

Recent Articles

Microsoft Patch Tuesday – January 2020
Symantec Threat Intelligence Blog • Preethi Koroth • 15 Jan 2024

This month the vendor has patched 49 vulnerabilities, 8 of which are rated Critical.

Posted: 15 Jan, 202014 Min ReadThreat Intelligence SubscribeMicrosoft Patch Tuesday – January 2020This month the vendor has patched 49 vulnerabilities, 8 of which are rated Critical.This month the vendor has patched 49 vulnerabilities, 8 of which are rated Critical. As always, customers are advised to follow these security best practices: Install vendor patches as soon as they are available. Run all software with the least privileges required wh...

IT threat evolution Q1 2020. Statistics
Securelist • Victor Chebyshev Fedor Sinitsyn Denis Parinov Oleg Kupreev Evgeny Lopatin Alexey Kulaev • 20 May 2020

These statistics are based on detection verdicts for Kaspersky products received from users who consented to providing statistical data. According to Kaspersky Security Network, Q1 2020 will be remembered primarily for the coronavirus pandemic and cybercriminals’ exploitation of the topic. In particular, the creators of a new modification of the Ginp banking trojan renamed their malware Coronavirus Finder and then began offering it for €0.75 disguised as an app supposedly capable of detectin...

Teenagers today. Can't take them anywhere, eh? 18-year-old kid accused of $50m SIM-swap cryptocurrency heist
The Register • Shaun Nichols in San Francisco • 25 Jan 2020

Also, Cisco, Citrix emit patches, US army advises using Signal

Roundup Here comes a summary of this week's computer security news beyond what we've already covered. An 18-year-old man from Canada has been accused of stealing more than $50m in cryptocurrency using SIM-swapping attacks. SIM swapping typically involves crooks tricking cellular network support staff to transfer victims' smartphone numbers to the criminals' own SIMs, and then using those numbers to reset passwords, or get two-factor authentication tokens, via text messages, and ultimately access...

Welcome to the 2020s: Booby-trapped Office files, NSA tipping off Windows cert-spoofing bugs, RDP flaws...
The Register • Shaun Nichols in San Francisco • 14 Jan 2020

Grab your Microsoft, Adobe, SAP, Intel, and VMware fixes now The four problems with the US government's latest rulebook on security bug disclosures

Patch Tuesday In the first Patch Tuesday of the year, Microsoft finds itself joined by Adobe, Intel, VMware, and SAP in dropping scheduled security updates. This month's Microsoft security fixes include three more remote-code-execution vulnerabilities in Redmond's Windows Remote Desktop Protocol software. Two of the flaws (CVE-2020-0609, CVE-2020-0610) are present on the server side in RD Gateway – requiring no authentication – while a third (CVE-2020-0611) is found on the client side. Dusti...