CVE-2020-1466: Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability
Overview
- Severity
- High (CVSS 7.5)
- CVSS Vector
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
- Category
- Denial of Service
- Exploit Status
- Not Exploited
- Patch Tuesday
- 2020-Aug
- Released
- 2020-08-11
- EPSS Score
- 9.79% (percentile: 93.0%)
Description
A denial of service vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an attacker connects to the target system using RDP and sends specially crafted requests. An attacker who successfully exploited this vulnerability could cause the RD Gateway service on the target system to stop responding.
To exploit this vulnerability, an attacker would need to run a specially crafted application against a server which provides RD Gateway services.
The update addresses the vulnerability by correcting how RD Gateway handles connection requests.
Affected Products (8)
Windows
- Windows Server 2019
- Windows Server 2019 (Server Core installation)
- Windows Server 2016
- Windows Server 2016 (Server Core installation)
ESU
- Windows Server 2012
- Windows Server 2012 (Server Core installation)
- Windows Server 2012 R2
- Windows Server 2012 R2 (Server Core installation)
Security Updates (6)
Acknowledgments
Microsoft Platform Security Assurance & Vulnerability Research
Revision History
- 2020-08-11: Information published.