384
VMScore

CVE-2020-0765

Published: 12/03/2020 Updated: 21/07/2021
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

An information disclosure vulnerability exists in the Remote Desktop Connection Manager (RDCMan) application when it improperly parses XML input containing a reference to an external entity, aka 'Remote Desktop Connection Manager Information Disclosure Vulnerability'.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft remote desktop connection manager

Github Repositories

Windows hardening script

#WIN-10 Hardening #STIG HIGH Severity #Anonymous access to Named Pipes and Shares must be restricted cmdexe /c "reg add "HKLM\SYSTEM\CurrentControlSet\Services\LanManServer\Parameters" /v RestrictNullSessAccess /t REG_DWORD /d 1 /f" #Anonymous enumeration of shares must be restricted cmdexe /c "reg add "HKLM\SYSTEM\CurrentControlSet\Control\Lsa&q

A solution to add VMs in bulk to Microsoft Remote Desktop Windows Store App.

Extend-RDC-Backup A solution to add VMs in bulk to Microsoft Remote Desktop Windows Store App Problem Statement Microsoft Remote Desktop (From Windows Store App) currently do not support bulk addition of VMs However there is a way to restore VMs from Backup Solution Approach This PowerShell script will read the current backup and extend the backup with additional required VM

Recent Articles

Microsoft Patch Tuesday – March 2020
Symantec Threat Intelligence Blog • Preethi Koroth • 11 Mar 2024

This month the vendor has patched 115 vulnerabilities, 25 of which are rated Critical.

Posted: 11 Mar, 202028 Min ReadThreat Intelligence SubscribeMicrosoft Patch Tuesday – March 2020This month the vendor has patched 115 vulnerabilities, 25 of which are rated Critical.As always, customers are advised to follow these security best practices: Install vendor patches as soon as they are available. Run all software with the least privileges required while still maintaining functionality. Avoid handling files from unknown or questionabl...