2024-05-26 14:27:05 +02:00
### [CVE-2019-1182](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1182)
2024-06-07 04:52:01 +00:00










2024-05-26 14:27:05 +02:00



2024-06-07 04:52:01 +00:00

& color=blue)
& color=blue)


& color=blue)

& color=blue)

& color=blue)
2024-05-26 14:27:05 +02:00
& color=blue)
2025-09-29 21:09:30 +02:00






2024-05-26 14:27:05 +02:00
### Description
2024-06-07 04:52:01 +00:00
A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.To exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems Remote Desktop Service via RDP.The update addresses the vulnerability by correcting how Remote Desktop Services handles connection requests.
2024-05-26 14:27:05 +02:00
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/Creamy-Chicken-Soup/writeups-about-analysis-CVEs-and-Exploits-on-the-Windows
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/nomi-sec/PoC-in-GitHub