Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!pic.twitter.com/FekupjS6qG
-
-
Thank you, appreciated. Lots of orgs won’t have patched this yet in regular patch cycles. Do you know what Windows events it generates for connections, crash and code exec, if any? Eg under Application, and Applications - TS Gateway - Operational?
-
I'll have a look at it tomorrow.
- Još 1 odgovor
Novi razgovor -
-
-
Good call. Had the same discussions before publishing my writeup and decided against publishing even a basic DoS PoC.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
why don't you sell it? </justkidding>
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
I think this is a good call Luca. Just a follow up - can you share a pcap with me so network based detections can be confirmed, and be used when someone released similiar RCE? cheers
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

