Vulnerability Name: | CVE-2014-0296 (CCN-93430) | ||||||||
Assigned: | 2013-12-03 | ||||||||
Published: | 2014-06-10 | ||||||||
Updated: | 2019-05-15 | ||||||||
Summary: | The Remote Desktop Protocol (RDP) implementation in Microsoft Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 does not properly encrypt sessions, which makes it easier for man-in-the-middle attackers to obtain sensitive information by sniffing the network or modify session content by sending crafted RDP packets, aka "RDP MAC Vulnerability." | ||||||||
CVSS v3 Severity: | 5.4 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
| ||||||||
CVSS v2 Severity: | 5.1 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P) 3.8 Low (Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
3.5 Low (CCN Temporal CVSS v2 Vector: AV:A/AC:L/Au:N/C:P/I:P/A:N/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-310 | ||||||||
Vulnerability Consequences: | Bypass Security | ||||||||
References: | Source: CONFIRM Type: Third Party Advisory http://blogs.technet.com/b/srd/archive/2014/06/10/assessing-risk-for-the-june-2014-security-updates.aspx Source: MITRE Type: CNA CVE-2014-0296 Source: SECUNIA Type: Third Party Advisory 58524 Source: CCN Type: Microsoft Security Bulletin MS14-030 Vulnerability in Remote Desktop Could Allow Tampering (2969259) Source: BID Type: Third Party Advisory, VDB Entry 67865 Source: CCN Type: BID-67865 Microsoft Windows Remote Desktop Protocol CVE-2014-0296 Security Bypass Vulnerability Source: MS Type: Patch, Vendor Advisory MS14-030 Source: XF Type: UNKNOWN ms-win-cve20140296-sec-bypass(93430) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |