CVE-2015-2472Improper Input Validation in Microsoft Windows Server 2008

Severity
4.3MEDIUMNVD
EPSS
3.3%
top 12.74%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 15
Latest updateMay 14

Description

Remote Desktop Session Host (RDSH) in Remote Desktop Protocol (RDP) through 8.1 in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly verify certificates, which allows man-in-the-middle attackers to spoof clients via a crafted certificate with valid Issuer and Serial Number fields, aka "Remote Desktop Session Host Spoofing Vulnerability."

CVSS vector

AV:N/AC:M/C:N/I:P/A:NExploitability: 8.6 | Impact: 2.9

Affected Packages1 packages

Patches

🔴Vulnerability Details

1
GHSA
GHSA-xhr2-vhcg-3g56: Remote Desktop Session Host (RDSH) in Remote Desktop Protocol (RDP) through 82022-05-14

🕵️Threat Intelligence

2
Talos
Microsoft Patch Tuesday - August 20152015-08-11
Talos
Microsoft Patch Tuesday - August 20152015-08-11