Current Description

The Remote Desktop Protocol (RDP) implementation in Microsoft Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 does not properly encrypt sessions, which makes it easier for man-in-the-middle attackers to obtain sensitive information by sniffing the network or modify session content by sending crafted RDP packets, aka "RDP MAC Vulnerability."

Basic Data

PublishedJune 11, 2014
Last ModifiedMay 15, 2019
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-310
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:H/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityHIGH
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score5.1
Exploitability Score4.9
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.


  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSMicrosoftWindows 7-sp1******
    2.3OSMicrosoftWindows 8-*******
    2.3OSMicrosoftWindows 8.1-*******
    2.3OSMicrosoftWindows Server 2012-*******
    2.3OSMicrosoftWindows Server 2012r2*******

Vulnerable Software List

Microsoft Windows 7 -
Microsoft Windows 8 -
Microsoft Windows Server 2012 -, r2
Microsoft Windows 8.1 -


NameSourceURLTags Party Advisory
58524 Party Advisory
67865 Party Advisory VDB Entry
MS14-030 Vendor Advisory