CVE-2014-0296

Current Description

The Remote Desktop Protocol (RDP) implementation in Microsoft Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 does not properly encrypt sessions, which makes it easier for man-in-the-middle attackers to obtain sensitive information by sniffing the network or modify session content by sending crafted RDP packets, aka "RDP MAC Vulnerability."

Basic Data

PublishedJune 11, 2014
Last ModifiedMay 15, 2019
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-310
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:H/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityHIGH
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score5.1
SeverityMEDIUM
Exploitability Score4.9
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSMicrosoftWindows 7-sp1******
    2.3OSMicrosoftWindows 8-*******
    2.3OSMicrosoftWindows 8.1-*******
    2.3OSMicrosoftWindows Server 2012-*******
    2.3OSMicrosoftWindows Server 2012r2*******

Vulnerable Software List

VendorProductVersions
Microsoft Windows 7 -
Microsoft Windows 8 -
Microsoft Windows Server 2012 -, r2
Microsoft Windows 8.1 -

References

NameSourceURLTags
http://blogs.technet.com/b/srd/archive/2014/06/10/assessing-risk-for-the-june-2014-security-updates.aspxhttp://blogs.technet.com/b/srd/archive/2014/06/10/assessing-risk-for-the-june-2014-security-updates.CONFIRMThird Party Advisory
58524http://secunia.com/advisories/58524SECUNIAThird Party Advisory
67865http://www.securityfocus.com/bid/67865BIDThird Party Advisory VDB Entry
MS14-030https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-030MSPATCH Vendor Advisory