5 results (0.021 seconds)

CVSS: 10.0EPSS: 97%CPEs: 139EXPL: 43

A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'. Existe una vulnerabilidad de ejecución remota de código en Remote Desktop Services, anteriormente conocido como Terminal Services, cuando un atacante no autenticado se conecta al sistema de destino mediante RDP y envía peticiones especialmente diseñadas, conocida como 'Remote Desktop Services Remote Code Execution Vulnerability'. The RDP termdd.sys driver improperly handles binds to internal-only channel MS_T120, allowing a malformed Disconnect Provider Indication message to cause a use-after-free. With a controllable data/size remote nonpaged pool spray, an indirect call gadget of the freed channel is used to achieve arbitrary code execution. Microsoft Remote Desktop Services, formerly known as Terminal Service, contains an unspecified vulnerability that allows an unauthenticated attacker to connect to the target system using RDP and send specially crafted requests. • https://www.exploit-db.com/exploits/47120 https://www.exploit-db.com/exploits/46946 https://www.exploit-db.com/exploits/47416 https://www.exploit-db.com/exploits/47683 https://github.com/k8gege/CVE-2019-0708 https://github.com/n1xbyte/CVE-2019-0708 https://github.com/victor0013/CVE-2019-0708 https://github.com/cbwang505/CVE-2019-0708-EXP-Windows https://github.com/Leoid/CVE-2019-0708 https://github.com/p0p0p0/CVE-2019-0708-exploit https://github.com/worawit • CWE-416: Use After Free •

CVSS: 6.5EPSS: 0%CPEs: 66EXPL: 0

Huawei Tecal RH1288 V2 V100R002C00SPC107 and earlier versions, Tecal RH2265 V2 V100R002C00, Tecal RH2285 V2 V100R002C00SPC115 and earlier versions, Tecal RH2265 V2 V100R002C00, Tecal RH2285H V2 V100R002C00SPC111 and earlier versions, Tecal RH2268 V2 V100R002C00, Tecal RH2288 V2 V100R002C00SPC117 and earlier versions, Tecal RH2288H V2 V100R002C00SPC115 and earlier versions, Tecal RH2485 V2 V100R002C00SPC502 and earlier versions, Tecal RH5885 V2 V100R001C02SPC109 and earlier versions, Tecal RH5885 V3 V100R003C01SPC102 and earlier versions, Tecal RH5885H V3 V100R003C00SPC102 and earlier versions, Tecal XH310 V2 V100R001C00SPC110 and earlier versions, Tecal XH311 V2 V100R001C00SPC110 and earlier versions, Tecal XH320 V2 V100R001C00SPC110 and earlier versions, Tecal XH621 V2 V100R001C00SPC106 and earlier versions, Tecal DH310 V2 V100R001C00SPC110 and earlier versions, Tecal DH320 V2 V100R001C00SPC106 and earlier versions, Tecal DH620 V2 V100R001C00SPC106 and earlier versions, Tecal DH621 V2 V100R001C00SPC107 and earlier versions, Tecal DH628 V2 V100R001C00SPC107 and earlier versions, Tecal BH620 V2 V100R002C00SPC107 and earlier versions, Tecal BH621 V2 V100R002C00SPC106 and earlier versions, Tecal BH622 V2 V100R002C00SPC110 and earlier versions, Tecal BH640 V2 V100R002C00SPC108 and earlier versions, Tecal CH121 V100R001C00SPC180 and earlier versions, Tecal CH140 V100R001C00SPC110 and earlier versions, Tecal CH220 V100R001C00SPC180 and earlier versions, Tecal CH221 V100R001C00SPC180 and earlier versions, Tecal CH222 V100R002C00SPC180 and earlier versions, Tecal CH240 V100R001C00SPC180 and earlier versions, Tecal CH242 V100R001C00SPC180 and earlier versions, Tecal CH242 V3 V100R001C00SPC110 and earlier versions could allow users who log in to the products to view the sessions IDs of all online users on the Online Users page of the web UI. Huawei Tecal RH1288 V2 V100R002C00SPC107 y versiones anteriores, Tecal RH2265 V2 V100R002C00, Tecal RH2285 V2 V100R002C00SPC115 y versiones anteriores, Tecal RH2265 V2 V100R002C00, Tecal RH2285H V2 V100R002C00SPC111 y versiones anteriores, Tecal RH2268 V2 V100R002C00, Tecal RH2288 V2 V100R002C00SPC117 y versiones anteriores, Tecal RH2288H V2 V100R002C00SPC115 y versiones anteriores, Tecal RH2485 V2 V100R002C00SPC502 y versiones anteriores, Tecal RH5885 V2 V100R001C02SPC109 y versiones anteriores, Tecal RH5885 V3 V100R003C01SPC102 y versiones anteriores, Tecal RH5885H V3 V100R003C00SPC102 y versiones anteriores, Tecal XH310 V2 V100R001C00SPC110 y versiones anteriores, Tecal XH311 V2 V100R001C00SPC110 y versiones anteriores, Tecal XH320 V2 V100R001C00SPC110 y versiones anteriores, Tecal XH621 V2 V100R001C00SPC106 y versiones anteriores, Tecal DH310 V2 V100R001C00SPC110 y versiones anteriores, Tecal DH320 V2 V100R001C00SPC106 y versiones anteriores, Tecal DH620 V2 V100R001C00SPC106 y versiones anteriores, Tecal DH621 V2 V100R001C00SPC107 y versiones anteriores, Tecal DH628 V2 V100R001C00SPC107 y versiones anteriores, Tecal BH620 V2 V100R002C00SPC107 y versiones anteriores, Tecal BH621 V2 V100R002C00SPC106 y versiones anteriores, Tecal BH622 V2 V100R002C00SPC110 y versiones anteriores, Tecal BH640 V2 V100R002C00SPC108 y versiones anteriores, Tecal CH121 V100R001C00SPC180 y versiones anteriores, Tecal CH140 V100R001C00SPC110 y versiones anteriores, Tecal CH220 V100R001C00SPC180 y versiones anteriores, Tecal CH221 V100R001C00SPC180 y versiones anteriores, Tecal CH222 V100R002C00SPC180 y versiones anteriores, Tecal CH240 V100R001C00SPC180 y versiones anteriores, Tecal CH242 V100R001C00SPC180 y versiones anteriores, Tecal CH242 V3 V100R001C00SPC110 y versiones anteriores podrían permitir a los usuarios que inician sesión en los productos ver los IDs de sesión de todos los usuarios en línea en la página Online Users de la IU web. • http://www.huawei.com/en/psirt/security-advisories/hw-408100 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.8EPSS: 0%CPEs: 66EXPL: 0

Huawei Tecal RH1288 V2 V100R002C00SPC107 and earlier versions, Tecal RH2265 V2 V100R002C00, Tecal RH2285 V2 V100R002C00SPC115 and earlier versions, Tecal RH2265 V2 V100R002C00, Tecal RH2285H V2 V100R002C00SPC111 and earlier versions, Tecal RH2268 V2 V100R002C00, Tecal RH2288 V2 V100R002C00SPC117 and earlier versions, Tecal RH2288H V2 V100R002C00SPC115 and earlier versions, Tecal RH2485 V2 V100R002C00SPC502 and earlier versions, Tecal RH5885 V2 V100R001C02SPC109 and earlier versions, Tecal RH5885 V3 V100R003C01SPC102 and earlier versions, Tecal RH5885H V3 V100R003C00SPC102 and earlier versions, Tecal XH310 V2 V100R001C00SPC110 and earlier versions, Tecal XH311 V2 V100R001C00SPC110 and earlier versions, Tecal XH320 V2 V100R001C00SPC110 and earlier versions, Tecal XH621 V2 V100R001C00SPC106 and earlier versions, Tecal DH310 V2 V100R001C00SPC110 and earlier versions, Tecal DH320 V2 V100R001C00SPC106 and earlier versions, Tecal DH620 V2 V100R001C00SPC106 and earlier versions, Tecal DH621 V2 V100R001C00SPC107 and earlier versions, Tecal DH628 V2 V100R001C00SPC107 and earlier versions, Tecal BH620 V2 V100R002C00SPC107 and earlier versions, Tecal BH621 V2 V100R002C00SPC106 and earlier versions, Tecal BH622 V2 V100R002C00SPC110 and earlier versions, Tecal BH640 V2 V100R002C00SPC108 and earlier versions, Tecal CH121 V100R001C00SPC180 and earlier versions, Tecal CH140 V100R001C00SPC110 and earlier versions, Tecal CH220 V100R001C00SPC180 and earlier versions, Tecal CH221 V100R001C00SPC180 and earlier versions, Tecal CH222 V100R002C00SPC180 and earlier versions, Tecal CH240 V100R001C00SPC180 and earlier versions, Tecal CH242 V100R001C00SPC180 and earlier versions, Tecal CH242 V3 V100R001C00SPC110 and earlier versions could allow attackers to execute arbitrary code or restart the system via crafted DNS packets. Huawei Tecal RH1288 V2 V100R002C00SPC107 y versiones anteriores, Tecal RH2265 V2 V100R002C00, Tecal RH2285 V2 V100R002C00SPC115 y versiones anteriores, Tecal RH2265 V2 V100R002C00, Tecal RH2285H V2 V100R002C00SPC111 y versiones anteriores, Tecal RH2268 V2 V100R002C00, Tecal RH2288 V2 V100R002C00SPC117 y versiones anteriores, Tecal RH2288H V2 V100R002C00SPC115 y versiones anteriores, Tecal RH2485 V2 V100R002C00SPC502 y versiones anteriores, Tecal RH5885 V2 V100R001C02SPC109 y versiones anteriores, Tecal RH5885 V3 V100R003C01SPC102 y versiones anteriores, Tecal RH5885H V3 V100R003C00SPC102 y versiones anteriores, Tecal XH310 V2 V100R001C00SPC110 y versiones anteriores, Tecal XH311 V2 V100R001C00SPC110 y versiones anteriores, Tecal XH320 V2 V100R001C00SPC110 y versiones anteriores, Tecal XH621 V2 V100R001C00SPC106 y versiones anteriores, Tecal DH310 V2 V100R001C00SPC110 y versiones anteriores, Tecal DH320 V2 V100R001C00SPC106 y versiones anteriores, Tecal DH620 V2 V100R001C00SPC106 y versiones anteriores, Tecal DH621 V2 V100R001C00SPC107 y versiones anteriores, Tecal DH628 V2 V100R001C00SPC107 y versiones anteriores, Tecal BH620 V2 V100R002C00SPC107 y versiones anteriores, Tecal BH621 V2 V100R002C00SPC106 y versiones anteriores, Tecal BH622 V2 V100R002C00SPC110 y versiones anteriores, Tecal BH640 V2 V100R002C00SPC108 y versiones anteriores, Tecal CH121 V100R001C00SPC180 y versiones anteriores, Tecal CH140 V100R001C00SPC110 y versiones anteriores, Tecal CH220 V100R001C00SPC180 y versiones anteriores, Tecal CH221 V100R001C00SPC180 y versiones anteriores, Tecal CH222 V100R002C00SPC180 y versiones anteriores, Tecal CH240 V100R001C00SPC180 y versiones anteriores, Tecal CH242 V100R001C00SPC180 y versiones anteriores, Tecal CH242 V3 V100R001C00SPC110 y versiones anteriores podrían permitir a atacantes ejecutar código arbitrario o reiniciar el sistema a través de paquetes DNS manipulados. • http://www.huawei.com/en/psirt/security-advisories/hw-408100 • CWE-19: Data Processing Errors •

CVSS: 7.5EPSS: 0%CPEs: 66EXPL: 0

Huawei Tecal RH1288 V2 V100R002C00SPC107 and earlier versions, Tecal RH2265 V2 V100R002C00, Tecal RH2285 V2 V100R002C00SPC115 and earlier versions, Tecal RH2265 V2 V100R002C00, Tecal RH2285H V2 V100R002C00SPC111 and earlier versions, Tecal RH2268 V2 V100R002C00, Tecal RH2288 V2 V100R002C00SPC117 and earlier versions, Tecal RH2288H V2 V100R002C00SPC115 and earlier versions, Tecal RH2485 V2 V100R002C00SPC502 and earlier versions, Tecal RH5885 V2 V100R001C02SPC109 and earlier versions, Tecal RH5885 V3 V100R003C01SPC102 and earlier versions, Tecal RH5885H V3 V100R003C00SPC102 and earlier versions, Tecal XH310 V2 V100R001C00SPC110 and earlier versions, Tecal XH311 V2 V100R001C00SPC110 and earlier versions, Tecal XH320 V2 V100R001C00SPC110 and earlier versions, Tecal XH621 V2 V100R001C00SPC106 and earlier versions, Tecal DH310 V2 V100R001C00SPC110 and earlier versions, Tecal DH320 V2 V100R001C00SPC106 and earlier versions, Tecal DH620 V2 V100R001C00SPC106 and earlier versions, Tecal DH621 V2 V100R001C00SPC107 and earlier versions, Tecal DH628 V2 V100R001C00SPC107 and earlier versions, Tecal BH620 V2 V100R002C00SPC107 and earlier versions, Tecal BH621 V2 V100R002C00SPC106 and earlier versions, Tecal BH622 V2 V100R002C00SPC110 and earlier versions, Tecal BH640 V2 V100R002C00SPC108 and earlier versions, Tecal CH121 V100R001C00SPC180 and earlier versions, Tecal CH140 V100R001C00SPC110 and earlier versions, Tecal CH220 V100R001C00SPC180 and earlier versions, Tecal CH221 V100R001C00SPC180 and earlier versions, Tecal CH222 V100R002C00SPC180 and earlier versions, Tecal CH240 V100R001C00SPC180 and earlier versions, Tecal CH242 V100R001C00SPC180 and earlier versions, Tecal CH242 V3 V100R001C00SPC110 and earlier versions could allow attackers to figure out the RMCP+ session IDs of users and access the system with forged identities. Huawei Tecal RH1288 V2 V100R002C00SPC107 y versiones anteriores, Tecal RH2265 V2 V100R002C00, Tecal RH2285 V2 V100R002C00SPC115 y versiones anteriores, Tecal RH2265 V2 V100R002C00, Tecal RH2285H V2 V100R002C00SPC111 y versiones anteriores, Tecal RH2268 V2 V100R002C00, Tecal RH2288 V2 V100R002C00SPC117 y versiones anteriores, Tecal RH2288H V2 V100R002C00SPC115 y versiones anteriores, Tecal RH2485 V2 V100R002C00SPC502 y versiones anteriores, Tecal RH5885 V2 V100R001C02SPC109 y versiones anteriores, Tecal RH5885 V3 V100R003C01SPC102 y versiones anteriores, Tecal RH5885H V3 V100R003C00SPC102 y versiones anteriores, Tecal XH310 V2 V100R001C00SPC110 y versiones anteriores, Tecal XH311 V2 V100R001C00SPC110 y versiones anteriores, Tecal XH320 V2 V100R001C00SPC110 y versiones anteriores, Tecal XH621 V2 V100R001C00SPC106 y versiones anteriores, Tecal DH310 V2 V100R001C00SPC110 y versiones anteriores, Tecal DH320 V2 V100R001C00SPC106 y versiones anteriores, Tecal DH620 V2 V100R001C00SPC106 y versiones anteriores, Tecal DH621 V2 V100R001C00SPC107 y versiones anteriores, Tecal DH628 V2 V100R001C00SPC107 y versiones anteriores, Tecal BH620 V2 V100R002C00SPC107 y versiones anteriores, Tecal BH621 V2 V100R002C00SPC106 y versiones anteriores, Tecal BH622 V2 V100R002C00SPC110 y versiones anteriores, Tecal BH640 V2 V100R002C00SPC108 y versiones anteriores, Tecal CH121 V100R001C00SPC180 y versiones anteriores, Tecal CH140 V100R001C00SPC110 y versiones anteriores, Tecal CH220 V100R001C00SPC180 y versiones anteriores, Tecal CH221 V100R001C00SPC180 y versiones anteriores, Tecal CH222 V100R002C00SPC180 y versiones anteriores, Tecal CH240 V100R001C00SPC180 y versiones anteriores, Tecal CH242 V100R001C00SPC180 y versiones anteriores, Tecal CH242 V3 V100R001C00SPC110 y versiones anteriores podrían permitir a atacantes averigurar los IDs de sesión RMCP+ de los usuarios y acceder al sistema con identidades falsificadas. • http://www.huawei.com/en/psirt/security-advisories/hw-408100 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 8.8EPSS: 0%CPEs: 66EXPL: 0

Huawei Tecal RH1288 V2 V100R002C00SPC107 and earlier versions, Tecal RH2265 V2 V100R002C00, Tecal RH2285 V2 V100R002C00SPC115 and earlier versions, Tecal RH2265 V2 V100R002C00, Tecal RH2285H V2 V100R002C00SPC111 and earlier versions, Tecal RH2268 V2 V100R002C00, Tecal RH2288 V2 V100R002C00SPC117 and earlier versions, Tecal RH2288H V2 V100R002C00SPC115 and earlier versions, Tecal RH2485 V2 V100R002C00SPC502 and earlier versions, Tecal RH5885 V2 V100R001C02SPC109 and earlier versions, Tecal RH5885 V3 V100R003C01SPC102 and earlier versions, Tecal RH5885H V3 V100R003C00SPC102 and earlier versions, Tecal XH310 V2 V100R001C00SPC110 and earlier versions, Tecal XH311 V2 V100R001C00SPC110 and earlier versions, Tecal XH320 V2 V100R001C00SPC110 and earlier versions, Tecal XH621 V2 V100R001C00SPC106 and earlier versions, Tecal DH310 V2 V100R001C00SPC110 and earlier versions, Tecal DH320 V2 V100R001C00SPC106 and earlier versions, Tecal DH620 V2 V100R001C00SPC106 and earlier versions, Tecal DH621 V2 V100R001C00SPC107 and earlier versions, Tecal DH628 V2 V100R001C00SPC107 and earlier versions, Tecal BH620 V2 V100R002C00SPC107 and earlier versions, Tecal BH621 V2 V100R002C00SPC106 and earlier versions, Tecal BH622 V2 V100R002C00SPC110 and earlier versions, Tecal BH640 V2 V100R002C00SPC108 and earlier versions, Tecal CH121 V100R001C00SPC180 and earlier versions, Tecal CH140 V100R001C00SPC110 and earlier versions, Tecal CH220 V100R001C00SPC180 and earlier versions, Tecal CH221 V100R001C00SPC180 and earlier versions, Tecal CH222 V100R002C00SPC180 and earlier versions, Tecal CH240 V100R001C00SPC180 and earlier versions, Tecal CH242 V100R001C00SPC180 and earlier versions, Tecal CH242 V3 V100R001C00SPC110 and earlier versions have a CSRF vulnerability. The products do not use the Token mechanism for web access control. When users log in to the Huawei servers and access websites containing the malicious CSRF script, the CSRF script is executed, which may cause configuration tampering and system restart. Huawei Tecal RH1288 V2 V100R002C00SPC107 y versiones anteriores, Tecal RH2265 V2 V100R002C00, Tecal RH2285 V2 V100R002C00SPC115 y versiones anteriores, Tecal RH2265 V2 V100R002C00, Tecal RH2285H V2 V100R002C00SPC111 y versiones anteriores, Tecal RH2268 V2 V100R002C00, Tecal RH2288 V2 V100R002C00SPC117 y versiones anteriores, Tecal RH2288H V2 V100R002C00SPC115 y versiones anteriores, Tecal RH2485 V2 V100R002C00SPC502 y versiones anteriores, Tecal RH5885 V2 V100R001C02SPC109 y versiones anteriores, Tecal RH5885 V3 V100R003C01SPC102 y versiones anteriores, Tecal RH5885H V3 V100R003C00SPC102 y versiones anteriores, Tecal XH310 V2 V100R001C00SPC110 y versiones anteriores, Tecal XH311 V2 V100R001C00SPC110 y versiones anteriores, Tecal XH320 V2 V100R001C00SPC110 y versiones anteriores, Tecal XH621 V2 V100R001C00SPC106 y versiones anteriores, Tecal DH310 V2 V100R001C00SPC110 y versiones anteriores, Tecal DH320 V2 V100R001C00SPC106 y versiones anteriores, Tecal DH620 V2 V100R001C00SPC106 y versiones anteriores, Tecal DH621 V2 V100R001C00SPC107 y versiones anteriores, Tecal DH628 V2 V100R001C00SPC107 y versiones anteriores, Tecal BH620 V2 V100R002C00SPC107 y versiones anteriores, Tecal BH621 V2 V100R002C00SPC106 y versiones anteriores, Tecal BH622 V2 V100R002C00SPC110 y versiones anteriores, Tecal BH640 V2 V100R002C00SPC108 y versiones anteriores, Tecal CH121 V100R001C00SPC180 y versiones anteriores, Tecal CH140 V100R001C00SPC110 y versiones anteriores, Tecal CH220 V100R001C00SPC180 y versiones anteriores, Tecal CH221 V100R001C00SPC180 y versiones anteriores, Tecal CH222 V100R002C00SPC180 y versiones anteriores, Tecal CH240 V100R001C00SPC180 y versiones anteriores, Tecal CH242 V100R001C00SPC180 y versiones anteriores, Tecal CH242 V3 V100R001C00SPC110 y versiones anteriores tienen una vulnerabilidad de CSRF. Los productos no utilizan el mecanismo Token para el control de acceso web. • http://www.huawei.com/en/psirt/security-advisories/hw-408100 • CWE-352: Cross-Site Request Forgery (CSRF) •