News, tips, advice, support for Windows, Office, PCs & more. Tech help. No bull. We're community supported by donations from our Plus Members, and proud of it
Home icon Home icon Home icon Email icon RSS icon
  • There’s a manual workaround for the RD Gateway security holes, CVE-2020-0609 and -0610

    Posted on January 18th, 2020 at 07:42 woody Comment on the AskWoody Lounge

    Marcus Hitchins has come up with a way to subvert the vulnerabilities described in this month’s Remote Desktop Gateway fixes CVE-2020-0609 and CVE-2020-0610.

    (Protip: If you aren’t in charge of a RD Gateway network, forget about it.)

    Posting on the KryptosLogic site, he gives manual bypass details:

    If for whatever reason you are unable to install the patch, it is still possible to prevent exploitation of these vulnerabilities. RDG supports the HTTP, HTTPS, and UDP protocols, but the vulnerabilities only exist in the code responsible for handling UDP. Simply disabling UDP Transport, or firewalling the UDP port (usually port 3391) is sufficient to prevent exploitation.

    Kevin Beaumont notes that it’ll involve a performance hit.

    Thx Florian Roth.