Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-0610 (GCVE-0-2020-0610)
Vulnerability from cvelistv5 – Published: 2020-01-14 23:11 – Updated: 2024-08-04 06:11- Remote Code Execution
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Microsoft | Windows Server |
Affected:
2019
Affected: 2016 Affected: 2012 Affected: 2012 R2 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T06:11:04.613Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Windows Server",
"vendor": "Microsoft",
"versions": [
{
"status": "affected",
"version": "2019"
},
{
"status": "affected",
"version": "2016"
},
{
"status": "affected",
"version": "2012"
},
{
"status": "affected",
"version": "2012 R2"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka \u0027Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability\u0027. This CVE ID is unique from CVE-2020-0609."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Remote Code Execution",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-01-14T23:11:23",
"orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"shortName": "microsoft"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2020-0610",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Windows Server",
"version": {
"version_data": [
{
"version_value": "2019"
},
{
"version_value": "2016"
},
{
"version_value": "2012"
},
{
"version_value": "2012 R2"
}
]
}
}
]
},
"vendor_name": "Microsoft"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka \u0027Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability\u0027. This CVE ID is unique from CVE-2020-0609."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610",
"refsource": "MISC",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"assignerShortName": "microsoft",
"cveId": "CVE-2020-0610",
"datePublished": "2020-01-14T23:11:23",
"dateReserved": "2019-11-04T00:00:00",
"dateUpdated": "2024-08-04T06:11:04.613Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7DF96F8-BA6A-4780-9CA3-F719B3F81074\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB18C4CE-5917-401E-ACF7-2747084FD36E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB79EE26-FC32-417D-A49C-A1A63165A968\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka \u0027Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability\u0027. This CVE ID is unique from CVE-2020-0609.\"}, {\"lang\": \"es\", \"value\": \"Se presenta una vulnerabilidad de ejecuci\\u00f3n de c\\u00f3digo remota en Windows Remote Desktop Gateway (RD Gateway) cuando un atacante no autenticado conecta con el sistema de destino mediante RDP y env\\u00eda peticiones especialmente dise\\u00f1adas, tambi\\u00e9n se conoce como \\\"Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability\\\". Este ID de CVE es diferente de CVE-2020-0609.\"}]",
"id": "CVE-2020-0610",
"lastModified": "2024-11-21T04:53:51.210",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 10.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2020-01-14T23:15:30.770",
"references": "[{\"url\": \"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}]",
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2020-0610\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2020-01-14T23:15:30.770\",\"lastModified\":\"2024-11-21T04:53:51.210\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka \u0027Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability\u0027. This CVE ID is unique from CVE-2020-0609.\"},{\"lang\":\"es\",\"value\":\"Se presenta una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo remota en Windows Remote Desktop Gateway (RD Gateway) cuando un atacante no autenticado conecta con el sistema de destino mediante RDP y env\u00eda peticiones especialmente dise\u00f1adas, tambi\u00e9n se conoce como \\\"Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability\\\". Este ID de CVE es diferente de CVE-2020-0609.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7DF96F8-BA6A-4780-9CA3-F719B3F81074\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB18C4CE-5917-401E-ACF7-2747084FD36E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB79EE26-FC32-417D-A49C-A1A63165A968\"}]}]}],\"references\":[{\"url\":\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}"
}
}
CERTFR-2020-AVI-026
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Microsoft Windows. Elles permettent à un attaquant de provoquer une exécution de code à distance, une atteinte à la confidentialité des données, une élévation de privilèges, un contournement de la fonctionnalité de sécurité et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows Server 2012 | ||
| Microsoft | Windows | Windows 10 pour systèmes x64 | ||
| Microsoft | Windows | Windows 10 Version 1909 pour ARM64-based Systems | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes x64 | ||
| Microsoft | Windows | Windows 10 Version 1909 pour systèmes x64 | ||
| Microsoft | Windows | Windows 10 Version 1903 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2019 (Server Core installation) | ||
| Microsoft | Windows | Windows Server 2019 | ||
| Microsoft | Windows | Windows Server 2012 R2 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes Itanium Service Pack 1 | ||
| Microsoft | Windows | Windows 10 Version 1803 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 10 Version 1803 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows Server, version 1803 (Server Core Installation) | ||
| Microsoft | Windows | Windows 10 Version 1709 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows Server 2016 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1903 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows RT 8.1 | ||
| Microsoft | Windows | Windows 7 pour systèmes x64 Service Pack 1 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour ARM64-based Systems | ||
| Microsoft | Windows | Windows 10 Version 1709 pour ARM64-based Systems | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1909 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1803 pour ARM64-based Systems | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 | ||
| Microsoft | Windows | Windows Server, version 1909 (Server Core installation) | ||
| Microsoft | Windows | Windows 8.1 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2016 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes Itanium Service Pack 2 | ||
| Microsoft | Windows | Windows 10 Version 1903 pour ARM64-based Systems | ||
| Microsoft | Windows | Windows 8.1 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 7 pour systèmes 32 bits Service Pack 1 | ||
| Microsoft | Windows | Windows Server, version 1903 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1709 pour systèmes x64 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Server 2012",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1909 pour ARM64-based Systems",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1909 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1903 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes Itanium Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1803 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1803 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server, version 1803 (Server Core Installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1709 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1903 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows RT 8.1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 7 pour syst\u00e8mes x64 Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour ARM64-based Systems",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1709 pour ARM64-based Systems",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1909 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1803 pour ARM64-based Systems",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server, version 1909 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 8.1 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes Itanium Service Pack 2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1903 pour ARM64-based Systems",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 8.1 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 7 pour syst\u00e8mes 32 bits Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server, version 1903 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1709 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-0625",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0625"
},
{
"name": "CVE-2020-0634",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0634"
},
{
"name": "CVE-2020-0628",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0628"
},
{
"name": "CVE-2020-0621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0621"
},
{
"name": "CVE-2020-0637",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0637"
},
{
"name": "CVE-2020-0627",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0627"
},
{
"name": "CVE-2020-0639",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0639"
},
{
"name": "CVE-2020-0633",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0633"
},
{
"name": "CVE-2020-0644",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0644"
},
{
"name": "CVE-2020-0630",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0630"
},
{
"name": "CVE-2020-0632",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0632"
},
{
"name": "CVE-2020-0642",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0642"
},
{
"name": "CVE-2020-0623",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0623"
},
{
"name": "CVE-2020-0613",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0613"
},
{
"name": "CVE-2020-0601",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0601"
},
{
"name": "CVE-2020-0612",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0612"
},
{
"name": "CVE-2020-0624",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0624"
},
{
"name": "CVE-2020-0631",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0631"
},
{
"name": "CVE-2020-0641",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0641"
},
{
"name": "CVE-2020-0609",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0609"
},
{
"name": "CVE-2020-0607",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0607"
},
{
"name": "CVE-2020-0629",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0629"
},
{
"name": "CVE-2020-0617",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0617"
},
{
"name": "CVE-2020-0616",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0616"
},
{
"name": "CVE-2020-0608",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0608"
},
{
"name": "CVE-2020-0611",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0611"
},
{
"name": "CVE-2020-0643",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0643"
},
{
"name": "CVE-2020-0610",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0610"
},
{
"name": "CVE-2020-0635",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0635"
},
{
"name": "CVE-2020-0620",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0620"
},
{
"name": "CVE-2020-0626",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0626"
},
{
"name": "CVE-2020-0614",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0614"
},
{
"name": "CVE-2020-0615",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0615"
},
{
"name": "CVE-2020-0638",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0638"
},
{
"name": "CVE-2020-0636",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0636"
},
{
"name": "CVE-2020-0622",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0622"
}
],
"links": [],
"reference": "CERTFR-2020-AVI-026",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-01-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eMicrosoft Windows\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer une ex\u00e9cution de code \u00e0 distance, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es, une \u00e9l\u00e9vation de privil\u00e8ges, un\ncontournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9 et un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 14 janvier 2020",
"url": "https://portal.msrc.microsoft.com/fr-FR/security-guidance"
}
]
}
CERTFR-2021-AVI-772
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Schneider. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | IGSS Data Collector (dc.exe) versions antérieures à V15.0.0.21244 | ||
| N/A | N/A | fellerLYnk versions antérieures à V2.6.2 | ||
| N/A | N/A | micrologiciel TM5CSLC100FS version antérieures v2.57 | ||
| N/A | N/A | Conext Advisor 2 Gateway | ||
| N/A | N/A | spaceLYnk versions antérieures à V2.6.2 | ||
| N/A | N/A | micrologiciel TM5NS31 versions antérieures à 2.79 | ||
| N/A | N/A | Conext Advisor 2 Cloud | ||
| N/A | N/A | Wiser for KNX versions antérieures à V2.6.2 | ||
| N/A | N/A | Modicon M218 logic controller versions antérieures à 5.1.0.8 | ||
| N/A | N/A | micrologiciel TM5NEIP1 versions antérieures à 3.12 | ||
| N/A | N/A | ConneXium Network Manager | ||
| N/A | N/A | Conext Control V2 Gateway | ||
| N/A | N/A | micrologiciel TM5CSLC200FS version antérieures v2.57 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IGSS Data Collector (dc.exe) versions ant\u00e9rieures \u00e0 V15.0.0.21244",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "fellerLYnk versions ant\u00e9rieures \u00e0 V2.6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "micrologiciel TM5CSLC100FS version ant\u00e9rieures v2.57",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Conext Advisor 2 Gateway",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "spaceLYnk versions ant\u00e9rieures \u00e0 V2.6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "micrologiciel TM5NS31 versions ant\u00e9rieures \u00e0 2.79",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Conext Advisor 2 Cloud",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Wiser for KNX versions ant\u00e9rieures \u00e0 V2.6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Modicon M218 logic controller versions ant\u00e9rieures \u00e0 5.1.0.8",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "micrologiciel TM5NEIP1 versions ant\u00e9rieures \u00e0 3.12",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "ConneXium Network Manager",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Conext Control V2 Gateway",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "micrologiciel TM5CSLC200FS version ant\u00e9rieures v2.57",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-17438",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-17438"
},
{
"name": "CVE-2019-0685",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0685"
},
{
"name": "CVE-2020-1472",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1472"
},
{
"name": "CVE-2020-0601",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0601"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0803"
},
{
"name": "CVE-2021-22801",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22801"
},
{
"name": "CVE-2020-0609",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0609"
},
{
"name": "CVE-2021-22802",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22802"
},
{
"name": "CVE-2019-0859",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0859"
},
{
"name": "CVE-2020-13987",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13987"
},
{
"name": "CVE-2020-1020",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1020"
},
{
"name": "CVE-2020-0610",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0610"
},
{
"name": "CVE-2020-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0938"
},
{
"name": "CVE-2020-1350",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1350"
},
{
"name": "CVE-2021-22800",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22800"
},
{
"name": "CVE-2021-22804",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22804"
},
{
"name": "CVE-2020-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0796"
},
{
"name": "CVE-2021-22803",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22803"
},
{
"name": "CVE-2021-22806",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22806"
},
{
"name": "CVE-2019-1040",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1040"
},
{
"name": "CVE-2021-22805",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22805"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-772",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-10-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSchneider. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Schneider",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-285-04 du 12 octobre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-04"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-285-03 du 12 octobre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-03"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-285-02 du 12 octobre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-02"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-285-05 du 12 octobre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-05"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-285-01 du 12 octobre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-01"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-285-06 du 12 octobre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-06"
}
]
}
CERTFR-2020-AVI-026
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Microsoft Windows. Elles permettent à un attaquant de provoquer une exécution de code à distance, une atteinte à la confidentialité des données, une élévation de privilèges, un contournement de la fonctionnalité de sécurité et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows Server 2012 | ||
| Microsoft | Windows | Windows 10 pour systèmes x64 | ||
| Microsoft | Windows | Windows 10 Version 1909 pour ARM64-based Systems | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes x64 | ||
| Microsoft | Windows | Windows 10 Version 1909 pour systèmes x64 | ||
| Microsoft | Windows | Windows 10 Version 1903 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2019 (Server Core installation) | ||
| Microsoft | Windows | Windows Server 2019 | ||
| Microsoft | Windows | Windows Server 2012 R2 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes Itanium Service Pack 1 | ||
| Microsoft | Windows | Windows 10 Version 1803 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 10 Version 1803 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows Server, version 1803 (Server Core Installation) | ||
| Microsoft | Windows | Windows 10 Version 1709 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows Server 2016 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1903 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows RT 8.1 | ||
| Microsoft | Windows | Windows 7 pour systèmes x64 Service Pack 1 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour ARM64-based Systems | ||
| Microsoft | Windows | Windows 10 Version 1709 pour ARM64-based Systems | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1909 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1803 pour ARM64-based Systems | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 | ||
| Microsoft | Windows | Windows Server, version 1909 (Server Core installation) | ||
| Microsoft | Windows | Windows 8.1 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2016 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes Itanium Service Pack 2 | ||
| Microsoft | Windows | Windows 10 Version 1903 pour ARM64-based Systems | ||
| Microsoft | Windows | Windows 8.1 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 7 pour systèmes 32 bits Service Pack 1 | ||
| Microsoft | Windows | Windows Server, version 1903 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1709 pour systèmes x64 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Server 2012",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1909 pour ARM64-based Systems",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1909 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1903 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes Itanium Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1803 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1803 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server, version 1803 (Server Core Installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1709 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1903 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows RT 8.1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 7 pour syst\u00e8mes x64 Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour ARM64-based Systems",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1709 pour ARM64-based Systems",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1909 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1803 pour ARM64-based Systems",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server, version 1909 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 8.1 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes Itanium Service Pack 2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1903 pour ARM64-based Systems",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 8.1 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 7 pour syst\u00e8mes 32 bits Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server, version 1903 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1709 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-0625",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0625"
},
{
"name": "CVE-2020-0634",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0634"
},
{
"name": "CVE-2020-0628",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0628"
},
{
"name": "CVE-2020-0621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0621"
},
{
"name": "CVE-2020-0637",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0637"
},
{
"name": "CVE-2020-0627",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0627"
},
{
"name": "CVE-2020-0639",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0639"
},
{
"name": "CVE-2020-0633",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0633"
},
{
"name": "CVE-2020-0644",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0644"
},
{
"name": "CVE-2020-0630",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0630"
},
{
"name": "CVE-2020-0632",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0632"
},
{
"name": "CVE-2020-0642",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0642"
},
{
"name": "CVE-2020-0623",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0623"
},
{
"name": "CVE-2020-0613",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0613"
},
{
"name": "CVE-2020-0601",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0601"
},
{
"name": "CVE-2020-0612",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0612"
},
{
"name": "CVE-2020-0624",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0624"
},
{
"name": "CVE-2020-0631",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0631"
},
{
"name": "CVE-2020-0641",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0641"
},
{
"name": "CVE-2020-0609",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0609"
},
{
"name": "CVE-2020-0607",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0607"
},
{
"name": "CVE-2020-0629",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0629"
},
{
"name": "CVE-2020-0617",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0617"
},
{
"name": "CVE-2020-0616",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0616"
},
{
"name": "CVE-2020-0608",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0608"
},
{
"name": "CVE-2020-0611",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0611"
},
{
"name": "CVE-2020-0643",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0643"
},
{
"name": "CVE-2020-0610",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0610"
},
{
"name": "CVE-2020-0635",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0635"
},
{
"name": "CVE-2020-0620",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0620"
},
{
"name": "CVE-2020-0626",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0626"
},
{
"name": "CVE-2020-0614",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0614"
},
{
"name": "CVE-2020-0615",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0615"
},
{
"name": "CVE-2020-0638",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0638"
},
{
"name": "CVE-2020-0636",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0636"
},
{
"name": "CVE-2020-0622",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0622"
}
],
"links": [],
"reference": "CERTFR-2020-AVI-026",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-01-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eMicrosoft Windows\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer une ex\u00e9cution de code \u00e0 distance, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es, une \u00e9l\u00e9vation de privil\u00e8ges, un\ncontournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9 et un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 14 janvier 2020",
"url": "https://portal.msrc.microsoft.com/fr-FR/security-guidance"
}
]
}
CERTFR-2021-AVI-772
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Schneider. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | IGSS Data Collector (dc.exe) versions antérieures à V15.0.0.21244 | ||
| N/A | N/A | fellerLYnk versions antérieures à V2.6.2 | ||
| N/A | N/A | micrologiciel TM5CSLC100FS version antérieures v2.57 | ||
| N/A | N/A | Conext Advisor 2 Gateway | ||
| N/A | N/A | spaceLYnk versions antérieures à V2.6.2 | ||
| N/A | N/A | micrologiciel TM5NS31 versions antérieures à 2.79 | ||
| N/A | N/A | Conext Advisor 2 Cloud | ||
| N/A | N/A | Wiser for KNX versions antérieures à V2.6.2 | ||
| N/A | N/A | Modicon M218 logic controller versions antérieures à 5.1.0.8 | ||
| N/A | N/A | micrologiciel TM5NEIP1 versions antérieures à 3.12 | ||
| N/A | N/A | ConneXium Network Manager | ||
| N/A | N/A | Conext Control V2 Gateway | ||
| N/A | N/A | micrologiciel TM5CSLC200FS version antérieures v2.57 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IGSS Data Collector (dc.exe) versions ant\u00e9rieures \u00e0 V15.0.0.21244",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "fellerLYnk versions ant\u00e9rieures \u00e0 V2.6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "micrologiciel TM5CSLC100FS version ant\u00e9rieures v2.57",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Conext Advisor 2 Gateway",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "spaceLYnk versions ant\u00e9rieures \u00e0 V2.6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "micrologiciel TM5NS31 versions ant\u00e9rieures \u00e0 2.79",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Conext Advisor 2 Cloud",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Wiser for KNX versions ant\u00e9rieures \u00e0 V2.6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Modicon M218 logic controller versions ant\u00e9rieures \u00e0 5.1.0.8",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "micrologiciel TM5NEIP1 versions ant\u00e9rieures \u00e0 3.12",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "ConneXium Network Manager",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Conext Control V2 Gateway",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "micrologiciel TM5CSLC200FS version ant\u00e9rieures v2.57",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-17438",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-17438"
},
{
"name": "CVE-2019-0685",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0685"
},
{
"name": "CVE-2020-1472",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1472"
},
{
"name": "CVE-2020-0601",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0601"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0803"
},
{
"name": "CVE-2021-22801",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22801"
},
{
"name": "CVE-2020-0609",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0609"
},
{
"name": "CVE-2021-22802",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22802"
},
{
"name": "CVE-2019-0859",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0859"
},
{
"name": "CVE-2020-13987",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13987"
},
{
"name": "CVE-2020-1020",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1020"
},
{
"name": "CVE-2020-0610",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0610"
},
{
"name": "CVE-2020-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0938"
},
{
"name": "CVE-2020-1350",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1350"
},
{
"name": "CVE-2021-22800",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22800"
},
{
"name": "CVE-2021-22804",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22804"
},
{
"name": "CVE-2020-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0796"
},
{
"name": "CVE-2021-22803",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22803"
},
{
"name": "CVE-2021-22806",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22806"
},
{
"name": "CVE-2019-1040",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1040"
},
{
"name": "CVE-2021-22805",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22805"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-772",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-10-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSchneider. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Schneider",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-285-04 du 12 octobre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-04"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-285-03 du 12 octobre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-03"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-285-02 du 12 octobre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-02"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-285-05 du 12 octobre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-05"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-285-01 du 12 octobre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-01"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Schneider SEVD-2021-285-06 du 12 octobre 2021",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-285-06"
}
]
}
CNVD-2020-07950
Vulnerability from cnvd - Published: 2020-02-14目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610
| Name | ['Microsoft Windows Server 2012 R2', 'Microsoft Windows Server 2016', 'Microsoft Windows Server 2012', 'Microsoft Windows Server 2019'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2020-0610"
}
},
"description": "Microsoft Windows Remote Desktop Gateway\u662f\u4e00\u6b3e\u57fa\u4e8eWindows\u7684\u8fdc\u7a0b\u684c\u9762\u7f51\u5173\u3002\n\nMicrosoft Windows Remote Desktop Gateway (RD Gateway)\u4e2d\u5b58\u5728\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u4f7f\u7528RDP\u8fde\u63a5\u5230\u76ee\u6807\u7cfb\u7edf\u5e76\u53d1\u9001\u7279\u5236\u7684\u8bf7\u6c42\u5229\u7528\u8be5\u6f0f\u6d1e\u5728\u76ee\u6807\u7cfb\u7edf\u4e0a\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2020-07950",
"openTime": "2020-02-14",
"patchDescription": "Microsoft Windows Remote Desktop Gateway\u662f\u4e00\u6b3e\u57fa\u4e8eWindows\u7684\u8fdc\u7a0b\u684c\u9762\u7f51\u5173\u3002\r\n\r\nMicrosoft Windows Remote Desktop Gateway (RD Gateway)\u4e2d\u5b58\u5728\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u4f7f\u7528RDP\u8fde\u63a5\u5230\u76ee\u6807\u7cfb\u7edf\u5e76\u53d1\u9001\u7279\u5236\u7684\u8bf7\u6c42\u5229\u7528\u8be5\u6f0f\u6d1e\u5728\u76ee\u6807\u7cfb\u7edf\u4e0a\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Microsoft Windows Remote Desktop Gateway\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Microsoft Windows Server 2012 R2",
"Microsoft Windows Server 2016",
"Microsoft Windows Server 2012",
"Microsoft Windows Server 2019"
]
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2020-0610",
"serverity": "\u9ad8",
"submitTime": "2020-01-16",
"title": "Microsoft Windows Remote Desktop Gateway\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e"
}
CERTFR-2020-ALE-005
Vulnerability from certfr_alerte - Published: - Updated:
[Mise à jour du 29 janvier 2020]
Du code d'attaque est désormais disponible publiquement concernant l'exploitation des vulnérabilités CVE-2020-0609 et CVE-2020-0610.
Pour l'instant, le code publique ne permet en l'état qu'un déni de service. Toutefois, il a été annoncé que du code d'attaque permettant une exécution de code arbitraire à distance sera bientôt publié. Cela rendra possible l'exploitation de ces vulnérabilités même à des attaquants d'un faible niveau technique.
Le CERT-FR insiste sur l'importance d'appliquer les correctifs dans les plus brefs délais.
[Version Initiale]
Depuis Microsoft Windows Server 2012, la passerelle d'accès distant Microsoft Remote Desktop Gateway (RD Gateway) intègre par défaut de nouvelles fonctionnalités dénommées RemoteFX améliorant la prise en charge de certains contenus multimédias et également l'optimisation du trafic réseau sur des liaisons de faible capacité. Dénommée RemoteFX for WAN, cette optimisation réseau permet de mettre en oeuvre le protocole RDP sur UDP avec chiffrement DTLS.
La fonction principale de la solution RD Gateway est de cloisonner les flux internes nécessaires au fonctionnement des Remote Desktop Services et de ne présenter que des interfaces HTTPS et DTLS sur Internet.
Le 14 janvier, Microsoft a émis deux avis de sécurité concernant deux vulnérabilités qui permettent une exécution de code à distance sans authentification préalable.
Qu'elle soit exposée sur Internet ou bien située sur une interconnexion du système d'information, une telle passerelle est de par sa fonction exposée. Elle constitue un élément critique de l'architecture d'un réseau et toute vulnérabilité doit donc être corrigée dans les plus brefs délais.
Solution
L'ANSSI recommande d'appliquer les correctifs mis à disposition par Microsoft dans le cadre de son programme Patch Tuesday (en date du 14 janvier) sans délai.
Dans l'éventualité où ces correctifs ne sont pas applicables rapidement, l'ANSSI suggère de désactiver le transport UDP pour le service Remote Desktop Gateway. Par ailleurs, ce mode de transport est voué à améliorer l'expérience utilisateur en cas d'utilisation d'un réseau de faible capacité, par conséquent, si le besoin n'est pas avéré, il est fortement recommandé de désactiver définitivement ce mode de transport.
La désactivation du transport UDP s'applique en passant par les propriétés du serveur RD Gateway :
- Dans l'onglet « Transport Parameters », « UDP transport parameters », décocher la case « enable UDP transport »
- Dans l'onglet « SSL bridging », décocher « utiliser le SSL bridging », décocher la case « HTTPS-HTTP bridging »
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Server 2012",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"closed_at": "2020-02-19",
"content": "## Solution\n\nL\u0027ANSSI recommande d\u0027appliquer les correctifs mis \u00e0 disposition par\nMicrosoft dans le cadre de son programme *Patch Tuesday* (en date du 14\njanvier) sans d\u00e9lai.\n\nDans l\u0027\u00e9ventualit\u00e9 o\u00f9 ces correctifs ne sont pas applicables rapidement,\nl\u0027ANSSI sugg\u00e8re de d\u00e9sactiver le transport UDP pour le service *Remote\nDesktop Gateway.* Par ailleurs, ce mode de transport est vou\u00e9 \u00e0\nam\u00e9liorer l\u0027exp\u00e9rience utilisateur en cas d\u0027utilisation d\u0027un r\u00e9seau de\nfaible capacit\u00e9, par cons\u00e9quent, si le besoin n\u0027est pas av\u00e9r\u00e9, il est\nfortement recommand\u00e9 de d\u00e9sactiver d\u00e9finitivement ce mode de transport.\n\nLa d\u00e9sactivation du transport UDP s\u0027applique en passant par les\npropri\u00e9t\u00e9s du serveur *RD Gateway* :\n\n- Dans l\u0027onglet \u00ab *Transport Parameters* \u00bb, \u00ab *UDP transport\n parameters* \u00bb, d\u00e9cocher la case \u00ab *enable UDP transport* \u00bb\n- Dans l\u0027onglet \u00ab *SSL bridging* \u00bb, d\u00e9cocher \u00ab *utiliser le SSL\n bridging* \u00bb, d\u00e9cocher la case \u00ab *HTTPS-HTTP bridging* \u00bb\n",
"cves": [
{
"name": "CVE-2020-0609",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0609"
},
{
"name": "CVE-2020-0610",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0610"
}
],
"links": [
{
"title": "Avis CERT-FR CERTFR-2020-AVI-026 du 14 janvier 2020",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2020-AVI-026/"
}
],
"reference": "CERTFR-2020-ALE-005",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-01-14T00:00:00.000000"
},
{
"description": "Correction lien CVE-2020-0609",
"revision_date": "2020-01-15T00:00:00.000000"
},
{
"description": "Annonce de la publication du code d\u0027attaque.",
"revision_date": "2020-01-29T00:00:00.000000"
},
{
"description": "Cl\u00f4ture de l\u0027alerte. La cl\u00f4ture d\u0027une alerte ne signifie pas la fin d\u0027une menace. Seule l\u0027application de la mise \u00e0 jour permet de vous pr\u00e9munir contre l\u0027exploitation de la vuln\u00e9rabilit\u00e9 correspondante.",
"revision_date": "2020-02-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "\u003cstrong\u003e\\[Mise \u00e0 jour du 29 janvier 2020\\]\u003c/strong\u003e\n\nDu code d\u0027attaque est d\u00e9sormais disponible publiquement concernant\nl\u0027exploitation des vuln\u00e9rabilit\u00e9s CVE-2020-0609 et\u00a0CVE-2020-0610.\n\nPour l\u0027instant, le code publique ne permet en l\u0027\u00e9tat qu\u0027un d\u00e9ni de\nservice. Toutefois, il a \u00e9t\u00e9 annonc\u00e9 que du code d\u0027attaque permettant\nune ex\u00e9cution de code arbitraire \u00e0 distance sera bient\u00f4t publi\u00e9. Cela\nrendra possible l\u0027exploitation de ces vuln\u00e9rabilit\u00e9s m\u00eame \u00e0 des\nattaquants d\u0027un faible niveau technique.\n\nLe CERT-FR insiste sur l\u0027importance d\u0027appliquer les correctifs dans les\nplus brefs d\u00e9lais.\n\n\u003cstrong\u003e\\[Version Initiale\\]\u003c/strong\u003e\n\nDepuis Microsoft Windows Server 2012, la passerelle d\u0027acc\u00e8s distant\n*Microsoft Remote Desktop Gateway* (*RD Gateway*) int\u00e8gre par d\u00e9faut de\nnouvelles fonctionnalit\u00e9s d\u00e9nomm\u00e9es *RemoteFX* am\u00e9liorant la prise en\ncharge de certains contenus multim\u00e9dias et \u00e9galement l\u0027optimisation du\ntrafic r\u00e9seau sur des liaisons de faible capacit\u00e9. D\u00e9nomm\u00e9e *RemoteFX\nfor WAN*, cette optimisation r\u00e9seau permet de mettre en oeuvre le\nprotocole RDP sur UDP avec chiffrement DTLS.\n\nLa fonction principale de la solution *RD Gateway* est de cloisonner les\nflux internes n\u00e9cessaires au fonctionnement des *Remote Desktop\nServices* et de ne pr\u00e9senter que des interfaces *HTTPS* et *DTLS* sur\nInternet.\n\nLe 14 janvier, Microsoft a \u00e9mis deux avis de s\u00e9curit\u00e9 concernant deux\nvuln\u00e9rabilit\u00e9s qui permettent une ex\u00e9cution de code \u00e0 distance sans\nauthentification pr\u00e9alable.\n\nQu\u0027elle soit expos\u00e9e sur Internet ou bien situ\u00e9e sur une interconnexion\ndu syst\u00e8me d\u0027information, une telle passerelle est de par sa fonction\nexpos\u00e9e. Elle constitue un \u00e9l\u00e9ment critique de l\u0027architecture d\u0027un\nr\u00e9seau et toute vuln\u00e9rabilit\u00e9 doit donc \u00eatre corrig\u00e9e dans les plus\nbrefs d\u00e9lais.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le serveur de passerelle RDP de Windows",
"vendor_advisories": [
{
"published_at": null,
"title": "Note de publication Microsoft du 14 janvier 2020",
"url": "https://portal.msrc.microsoft.com/fr-fr/security-guidance/releasenotedetail/2020-Jan"
},
{
"published_at": null,
"title": "Avis de s\u00e9curit\u00e9 Microsoft du 14 janvier 2020",
"url": "https://portal.msrc.microsoft.com/fr-FR/security-guidance"
}
]
}
CERTFR-2020-ALE-005
Vulnerability from certfr_alerte - Published: - Updated:
[Mise à jour du 29 janvier 2020]
Du code d'attaque est désormais disponible publiquement concernant l'exploitation des vulnérabilités CVE-2020-0609 et CVE-2020-0610.
Pour l'instant, le code publique ne permet en l'état qu'un déni de service. Toutefois, il a été annoncé que du code d'attaque permettant une exécution de code arbitraire à distance sera bientôt publié. Cela rendra possible l'exploitation de ces vulnérabilités même à des attaquants d'un faible niveau technique.
Le CERT-FR insiste sur l'importance d'appliquer les correctifs dans les plus brefs délais.
[Version Initiale]
Depuis Microsoft Windows Server 2012, la passerelle d'accès distant Microsoft Remote Desktop Gateway (RD Gateway) intègre par défaut de nouvelles fonctionnalités dénommées RemoteFX améliorant la prise en charge de certains contenus multimédias et également l'optimisation du trafic réseau sur des liaisons de faible capacité. Dénommée RemoteFX for WAN, cette optimisation réseau permet de mettre en oeuvre le protocole RDP sur UDP avec chiffrement DTLS.
La fonction principale de la solution RD Gateway est de cloisonner les flux internes nécessaires au fonctionnement des Remote Desktop Services et de ne présenter que des interfaces HTTPS et DTLS sur Internet.
Le 14 janvier, Microsoft a émis deux avis de sécurité concernant deux vulnérabilités qui permettent une exécution de code à distance sans authentification préalable.
Qu'elle soit exposée sur Internet ou bien située sur une interconnexion du système d'information, une telle passerelle est de par sa fonction exposée. Elle constitue un élément critique de l'architecture d'un réseau et toute vulnérabilité doit donc être corrigée dans les plus brefs délais.
Solution
L'ANSSI recommande d'appliquer les correctifs mis à disposition par Microsoft dans le cadre de son programme Patch Tuesday (en date du 14 janvier) sans délai.
Dans l'éventualité où ces correctifs ne sont pas applicables rapidement, l'ANSSI suggère de désactiver le transport UDP pour le service Remote Desktop Gateway. Par ailleurs, ce mode de transport est voué à améliorer l'expérience utilisateur en cas d'utilisation d'un réseau de faible capacité, par conséquent, si le besoin n'est pas avéré, il est fortement recommandé de désactiver définitivement ce mode de transport.
La désactivation du transport UDP s'applique en passant par les propriétés du serveur RD Gateway :
- Dans l'onglet « Transport Parameters », « UDP transport parameters », décocher la case « enable UDP transport »
- Dans l'onglet « SSL bridging », décocher « utiliser le SSL bridging », décocher la case « HTTPS-HTTP bridging »
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Server 2012",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"closed_at": "2020-02-19",
"content": "## Solution\n\nL\u0027ANSSI recommande d\u0027appliquer les correctifs mis \u00e0 disposition par\nMicrosoft dans le cadre de son programme *Patch Tuesday* (en date du 14\njanvier) sans d\u00e9lai.\n\nDans l\u0027\u00e9ventualit\u00e9 o\u00f9 ces correctifs ne sont pas applicables rapidement,\nl\u0027ANSSI sugg\u00e8re de d\u00e9sactiver le transport UDP pour le service *Remote\nDesktop Gateway.* Par ailleurs, ce mode de transport est vou\u00e9 \u00e0\nam\u00e9liorer l\u0027exp\u00e9rience utilisateur en cas d\u0027utilisation d\u0027un r\u00e9seau de\nfaible capacit\u00e9, par cons\u00e9quent, si le besoin n\u0027est pas av\u00e9r\u00e9, il est\nfortement recommand\u00e9 de d\u00e9sactiver d\u00e9finitivement ce mode de transport.\n\nLa d\u00e9sactivation du transport UDP s\u0027applique en passant par les\npropri\u00e9t\u00e9s du serveur *RD Gateway* :\n\n- Dans l\u0027onglet \u00ab *Transport Parameters* \u00bb, \u00ab *UDP transport\n parameters* \u00bb, d\u00e9cocher la case \u00ab *enable UDP transport* \u00bb\n- Dans l\u0027onglet \u00ab *SSL bridging* \u00bb, d\u00e9cocher \u00ab *utiliser le SSL\n bridging* \u00bb, d\u00e9cocher la case \u00ab *HTTPS-HTTP bridging* \u00bb\n",
"cves": [
{
"name": "CVE-2020-0609",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0609"
},
{
"name": "CVE-2020-0610",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0610"
}
],
"links": [
{
"title": "Avis CERT-FR CERTFR-2020-AVI-026 du 14 janvier 2020",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2020-AVI-026/"
}
],
"reference": "CERTFR-2020-ALE-005",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-01-14T00:00:00.000000"
},
{
"description": "Correction lien CVE-2020-0609",
"revision_date": "2020-01-15T00:00:00.000000"
},
{
"description": "Annonce de la publication du code d\u0027attaque.",
"revision_date": "2020-01-29T00:00:00.000000"
},
{
"description": "Cl\u00f4ture de l\u0027alerte. La cl\u00f4ture d\u0027une alerte ne signifie pas la fin d\u0027une menace. Seule l\u0027application de la mise \u00e0 jour permet de vous pr\u00e9munir contre l\u0027exploitation de la vuln\u00e9rabilit\u00e9 correspondante.",
"revision_date": "2020-02-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "\u003cstrong\u003e\\[Mise \u00e0 jour du 29 janvier 2020\\]\u003c/strong\u003e\n\nDu code d\u0027attaque est d\u00e9sormais disponible publiquement concernant\nl\u0027exploitation des vuln\u00e9rabilit\u00e9s CVE-2020-0609 et\u00a0CVE-2020-0610.\n\nPour l\u0027instant, le code publique ne permet en l\u0027\u00e9tat qu\u0027un d\u00e9ni de\nservice. Toutefois, il a \u00e9t\u00e9 annonc\u00e9 que du code d\u0027attaque permettant\nune ex\u00e9cution de code arbitraire \u00e0 distance sera bient\u00f4t publi\u00e9. Cela\nrendra possible l\u0027exploitation de ces vuln\u00e9rabilit\u00e9s m\u00eame \u00e0 des\nattaquants d\u0027un faible niveau technique.\n\nLe CERT-FR insiste sur l\u0027importance d\u0027appliquer les correctifs dans les\nplus brefs d\u00e9lais.\n\n\u003cstrong\u003e\\[Version Initiale\\]\u003c/strong\u003e\n\nDepuis Microsoft Windows Server 2012, la passerelle d\u0027acc\u00e8s distant\n*Microsoft Remote Desktop Gateway* (*RD Gateway*) int\u00e8gre par d\u00e9faut de\nnouvelles fonctionnalit\u00e9s d\u00e9nomm\u00e9es *RemoteFX* am\u00e9liorant la prise en\ncharge de certains contenus multim\u00e9dias et \u00e9galement l\u0027optimisation du\ntrafic r\u00e9seau sur des liaisons de faible capacit\u00e9. D\u00e9nomm\u00e9e *RemoteFX\nfor WAN*, cette optimisation r\u00e9seau permet de mettre en oeuvre le\nprotocole RDP sur UDP avec chiffrement DTLS.\n\nLa fonction principale de la solution *RD Gateway* est de cloisonner les\nflux internes n\u00e9cessaires au fonctionnement des *Remote Desktop\nServices* et de ne pr\u00e9senter que des interfaces *HTTPS* et *DTLS* sur\nInternet.\n\nLe 14 janvier, Microsoft a \u00e9mis deux avis de s\u00e9curit\u00e9 concernant deux\nvuln\u00e9rabilit\u00e9s qui permettent une ex\u00e9cution de code \u00e0 distance sans\nauthentification pr\u00e9alable.\n\nQu\u0027elle soit expos\u00e9e sur Internet ou bien situ\u00e9e sur une interconnexion\ndu syst\u00e8me d\u0027information, une telle passerelle est de par sa fonction\nexpos\u00e9e. Elle constitue un \u00e9l\u00e9ment critique de l\u0027architecture d\u0027un\nr\u00e9seau et toute vuln\u00e9rabilit\u00e9 doit donc \u00eatre corrig\u00e9e dans les plus\nbrefs d\u00e9lais.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le serveur de passerelle RDP de Windows",
"vendor_advisories": [
{
"published_at": null,
"title": "Note de publication Microsoft du 14 janvier 2020",
"url": "https://portal.msrc.microsoft.com/fr-fr/security-guidance/releasenotedetail/2020-Jan"
},
{
"published_at": null,
"title": "Avis de s\u00e9curit\u00e9 Microsoft du 14 janvier 2020",
"url": "https://portal.msrc.microsoft.com/fr-FR/security-guidance"
}
]
}
GSD-2020-0610
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2020-0610",
"description": "A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka \u0027Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability\u0027. This CVE ID is unique from CVE-2020-0609.",
"id": "GSD-2020-0610"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-0610"
],
"details": "A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka \u0027Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability\u0027. This CVE ID is unique from CVE-2020-0609.",
"id": "GSD-2020-0610",
"modified": "2023-12-13T01:21:44.960192Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2020-0610",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Windows Server",
"version": {
"version_data": [
{
"version_value": "2019"
},
{
"version_value": "2016"
},
{
"version_value": "2012"
},
{
"version_value": "2012 R2"
}
]
}
}
]
},
"vendor_name": "Microsoft"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka \u0027Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability\u0027. This CVE ID is unique from CVE-2020-0609."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610",
"refsource": "MISC",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2020-0610"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka \u0027Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability\u0027. This CVE ID is unique from CVE-2020-0609."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "N/A",
"refsource": "N/A",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
},
"lastModifiedDate": "2021-07-21T11:39Z",
"publishedDate": "2020-01-14T23:15Z"
}
}
}
GHSA-RFQR-XR33-6QPG
Vulnerability from github – Published: 2022-05-24 17:06 – Updated: 2022-05-24 17:06A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0609.
{
"affected": [],
"aliases": [
"CVE-2020-0610"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2020-01-14T23:15:00Z",
"severity": "HIGH"
},
"details": "A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka \u0027Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability\u0027. This CVE ID is unique from CVE-2020-0609.",
"id": "GHSA-rfqr-xr33-6qpg",
"modified": "2022-05-24T17:06:16Z",
"published": "2022-05-24T17:06:16Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0610"
},
{
"type": "WEB",
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610"
}
],
"schema_version": "1.4.0",
"severity": []
}
FKIE_CVE-2020-0610
Vulnerability from fkie_nvd - Published: 2020-01-14 23:15 - Updated: 2024-11-21 04:53| Vendor | Product | Version | |
|---|---|---|---|
| microsoft | windows_server_2012 | - | |
| microsoft | windows_server_2012 | r2 | |
| microsoft | windows_server_2016 | - | |
| microsoft | windows_server_2019 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka \u0027Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability\u0027. This CVE ID is unique from CVE-2020-0609."
},
{
"lang": "es",
"value": "Se presenta una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo remota en Windows Remote Desktop Gateway (RD Gateway) cuando un atacante no autenticado conecta con el sistema de destino mediante RDP y env\u00eda peticiones especialmente dise\u00f1adas, tambi\u00e9n se conoce como \"Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability\". Este ID de CVE es diferente de CVE-2020-0609."
}
],
"id": "CVE-2020-0610",
"lastModified": "2024-11-21T04:53:51.210",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-01-14T23:15:30.770",
"references": [
{
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610"
}
],
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.