1.2
CVSSv2

CVE-2020-9497

Published: 02/07/2020 Updated: 21/07/2021
CVSS v2 Base Score: 1.2 | Impact Score: 2.9 | Exploitability Score: 1.9
CVSS v3 Base Score: 4.4 | Impact Score: 3.6 | Exploitability Score: 0.8
Vector: AV:L/AC:H/Au:N/C:P/I:N/A:N

Vulnerability Summary

Apache Guacamole 1.1.0 and older do not properly validate datareceived from RDP servers via static virtual channels. If a userconnects to a malicious or compromised RDP server, specially-craftedPDUs could result in disclosure of information within the memory ofthe guacd process handling the connection.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache guacamole

fedoraproject fedora 32

fedoraproject fedora 33

debian debian linux 9.0

Vendor Advisories

Debian Bug report logs - #964195 CVE-2020-9497 CVE-2020-9498 Package: src:guacamole-client; Maintainer for src:guacamole-client is Debian Remote Maintainers <pkg-remote-team@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Fri, 3 Jul 2020 13:36:02 UTC Severity: grave Tags: security, u ...

Mailing Lists

CVE-2020-9497: Improper input validation of RDP static virtual channels Versions affected: Apache Guacamole 110 and earlier Description: Apache Guacamole 110 and older do not properly validate data received from RDP servers via static virtual channels If a user connects to a malicious or compromised RDP server, specially-crafted PDUs could r ...

Recent Articles

Apache Guacamole Opens Door for Total Control of Remote Footprint
Threatpost • Tara Seals • 02 Jul 2020

Apache Guacamole, a popular infrastructure for enabling remote working, is vulnerable to a slew of security bugs related to the Remote Desktop Protocol (RDP), researchers have warned. Admins should update their systems to avoid attacks bent on stealing information or remote code-execution.
“Once in control of the gateway, an attacker can eavesdrop on all incoming sessions, record all the credentials used, and even start new sessions to control the rest of the computers within the organiz...