CVE-2020-0609: Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability

Overview

Severity
Critical (CVSS 9.8)
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
Category
Remote Code Execution
Exploit Status
Not Exploited
Patch Tuesday
2020-Jan
Released
2020-01-14
Last Updated
2020-01-16
EPSS Score
89.78% (percentile: 99.6%)

Description

A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems RD Gateway via RDP. The update addresses the vulnerability by correcting how RD Gateway handles connection requests.

FAQ

What network ports are vulnerable to this attack? The vulnerability only affects UDP transport, which by default runs on UDP port 3391.

Detection & Weaponization (1 sources)

Maturity: Exploit

  • GitHub PoC: 5 repositories

Affected Products (4)

Windows

  • Windows Server 2019
  • Windows Server 2016
  • Windows Server 2012
  • Windows Server 2012 R2

Security Updates (6)

Acknowledgments

Microsoft Platform Security Assurance & Vulnerability Research

Revision History

  • 2020-01-14: Information published.
  • 2020-01-16: Added an FAQ. This is an information change only.