Microsoft Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution

Strike ID:
E20-0yw11
CVSS:
9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
False Positive:
f
Variants:
5
Year:
2020

Description

This strike replicates an attack known as Bluegate against Remote Desktop Gateway (RDG), exploiting a heap buffer overflow. The flaw is due to unsanitized index parameters when parsing large UDP packets. Successful exploitation allows the attacker to execute arbitrary code on the target system, with the privileges of the user running the RDG daemon. NOTE: Normally, a connection to the RDG is formed through DTLS(Datagram TLS). After the initial handshake, all the conversation is encrypted. To showcase the actual malicious bytestream message, the strike is implemented in such a way as to present the exchange in plain, devoid of any encryption.

CVE

References