{"vulnerability": "CVE-2020-0609", "sightings": [{"uuid": "d2b301e8-c692-4c6e-b5a7-a8660827f34c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0609", "type": "seen", "source": "MISP/8f82c79a-8930-4bac-bf4b-df061b5f3fee", "content": "", "creation_timestamp": "2024-11-14T06:07:27.000000Z"}, {"uuid": "5a5594d1-45aa-4966-a064-1f80d6d5cd92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0609", "type": "published-proof-of-concept", "source": "https://t.me/BleepingComputer/6659", "content": "DOS Exploit PoC Released for Critical Windows RDP Gateway Bugs\n\nA proof-of-concept (PoC) denial of service exploit has been published by Danish security researcher Ollypwn for the\u00a0CVE-2020-0609\u00a0and\u00a0CVE-2020-0610\u00a0flaws affecting the Remote Desktop Gateway (RD Gateway) component on Windows Server (2012,\u00a02012 R2, 2016, and 2019) devices. [...]\n\nhttps://www.bleepingcomputer.com/news/security/dos-exploit-poc-released-for-critical-windows-rdp-gateway-bugs/", "creation_timestamp": "2020-01-24T20:54:26.000000Z"}, {"uuid": "66994843-bca2-402f-ad4d-e8f074330202", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2020-0609", "type": "seen", "source": "https://www.kyberturvallisuuskeskus.fi/fi/haavoittuvuus-microsoft-remote-desktop-gatewayssa", "content": "", "creation_timestamp": "2020-01-28T11:27:24.000000Z"}, {"uuid": "33621221-78d2-4990-a203-a73de8a23e3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0609", "type": "seen", "source": "https://t.me/N0iSeBit/365", "content": "\u041d\u0443 \u0438 \u0434\u043e \u043a\u0443\u0447\u0438 \u0441\u0435\u0433\u043e\u0434\u043d\u044f \u0435\u0449\u0435 \u0431\u044b\u043b\u0430 \u0437\u0430\u043a\u0440\u044b\u0442\u0430 \u043f\u0430\u0447\u043a\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 RDP CVE-2020-0609, CVE-2020-0610, CVE-2020-0611. \u0412\u0441\u0435 \u0431\u0435\u0436\u0438\u043c \u0441\u0442\u0430\u0432\u0438\u0442\u044c \u043f\u0430\u0442\u0447\u0438 \u0441\u043e \u0441\u0442\u0440\u0430\u0448\u043d\u043e\u0439 \u0441\u0438\u043b\u043e\u0439 \u270a\n\n\u0418\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u044b\u0439 \u0444\u0430\u043a\u0442, \u0447\u0442\u043e US Department of Homeland Security (DHS) \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b \u0441\u0440\u043e\u0447\u043d\u0443\u044e \u0434\u0438\u0440\u0435\u043a\u0442\u0438\u0432\u0443 (Emergency Directive 20-02 ) \u043f\u043e \u0442\u043e\u0442\u0430\u043b\u044c\u043d\u043e\u043c\u0443 \u043f\u0430\u0442\u0447\u0438\u043d\u0433\u0443 \u0432\u0441\u0435\u0445 \u044d\u0442\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439.\n\n\ud83d\udc49 https://cyber.dhs.gov/assets/report/ed-20-02.pdf\n\n\u041d\u0435 \u0437\u0430\u0442\u044f\u0433\u0438\u0432\u0430\u0439\u0442\u0435 \u0441 \u043f\u0430\u0442\u0447\u0430\u043c\u0438! \ud83d\ude31", "creation_timestamp": "2020-01-15T01:02:21.000000Z"}, {"uuid": "8c549e1d-5b18-4b5b-9b10-07f4c72f716f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0609", "type": "seen", "source": "https://t.me/cybershit/653", "content": "\u041a\u0441\u0442\u0430\u0442\u0438, \u043f\u043e\u043c\u0438\u043c\u043e CVE-2020-0601, \u0432 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u043c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 Microsoft \u0442\u0430\u043a\u0436\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0438 RCE \u0432 Windows Remote Desktop Gateway (CVE-2020-0609, CVE-2020-0610) \u0438 Remote Desktop Client (CVE-2020-0611), \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0442 \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 Windows 7 \u0438 Server 2008 R2, \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0441 \u0441\u0435\u0433\u043e\u0434\u043d\u044f\u0448\u043d\u0435\u0433\u043e \u0434\u043d\u044f \u043e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043f\u0440\u0435\u043a\u0440\u0430\u0449\u0435\u043d\u0430.\n\nhttps://www.us-cert.gov/ncas/alerts/aa20-014a", "creation_timestamp": "2020-01-15T08:34:29.000000Z"}, {"uuid": "9343e531-4a06-445d-9dee-0fab843088bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0609", "type": "published-proof-of-concept", "source": "https://t.me/canyoupwnme/6269", "content": "BlueGate\nPoC (DoS) for CVE-2020-0609 &amp; CVE-2020-0610 - RD Gateway RCE\nhttps://github.com/ollypwn/BlueGate", "creation_timestamp": "2020-01-24T09:03:43.000000Z"}, {"uuid": "2928638f-0b12-4b34-aff4-714d5b410a71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0609", "type": "published-proof-of-concept", "source": "https://t.me/SecLabNews/6715", "content": "\u041d\u0438\u0434\u0435\u0440\u043b\u0430\u043d\u0434\u0441\u043a\u0438\u0439 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0438\u0439 \u043f\u0441\u0435\u0432\u0434\u043e\u043d\u0438\u043c Ollypwn, \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b PoC-\u043a\u043e\u0434\u044b \u0434\u043b\u044f \u0434\u0432\u0443\u0445 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 (CVE-2020-0609 \u0438 CVE-2020-0610) \u0432 \u0448\u043b\u044e\u0437\u043e\u0432\u043e\u043c \u0441\u0435\u0440\u0432\u0435\u0440\u0435 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0440\u0430\u0431\u043e\u0447\u0435\u0433\u043e \u0441\u0442\u043e\u043b\u0430 Windows RD Gateway \u0432 Windows Server (2012, 2012 R2, 2016 \u0438 2019).\n\n\n\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u044b \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u044b \u0434\u043b\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 Windows RD Gateway", "creation_timestamp": "2020-01-26T11:50:02.000000Z"}, {"uuid": "2d38bb78-e7ab-4bbd-bc7a-cfdf90cef6b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0609", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/552", "content": "#Red_Team_Tactics\nBlueGate:\nPoC (DoS + scanner) for CVE-2020-0609, CVE-2020-0610 - RD Gateway RCE\nhttps://github.com/ollypwn/BlueGate", "creation_timestamp": "2025-03-09T17:58:47.000000Z"}]}