{"vulnerability": "CVE-2020-0610", "sightings": [{"uuid": "af78bab4-2d8e-4d19-8fd2-79f9fb4f6aa5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0610", "type": "seen", "source": "MISP/a11981ae-b6bd-4a04-ad99-19fa9b4ca6d3", "content": "", "creation_timestamp": "2024-11-14T06:07:26.000000Z"}, {"uuid": "237084d4-4dfe-4eb6-9059-17ddaeefd158", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2020-0610", "type": "seen", "source": "https://www.kyberturvallisuuskeskus.fi/fi/haavoittuvuus-microsoft-remote-desktop-gatewayssa", "content": "", "creation_timestamp": "2020-01-28T11:27:24.000000Z"}, {"uuid": "3ec9cbbc-c5bb-4328-bbda-8bba85972faf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0610", "type": "published-proof-of-concept", "source": "Telegram/xOF0wKG3E1tSWdpJ4_yjov1SC7Athylo3WSDX12biA3TA_o", "content": "", "creation_timestamp": "2025-09-03T11:00:08.000000Z"}, {"uuid": "6fe42b20-b255-492b-8b09-19409702de18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0610", "type": "published-proof-of-concept", "source": "Telegram/Mtnqi4yCbfdPSSOAO6TK69p_6pY8b0QT5olm0ktI9Xuq7Wk", "content": "", "creation_timestamp": "2025-09-05T01:29:50.000000Z"}, {"uuid": "68b3d66b-59c3-4e93-bd5b-4f149835e346", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0610", "type": "published-proof-of-concept", "source": "Telegram/ktfF1YjAfTgGnV4T6AQBqxJFytPD6zIUM1POBEH3rhcPUWE", "content": "", "creation_timestamp": "2025-09-03T15:00:07.000000Z"}, {"uuid": "3cad3a26-37b9-49ad-adb1-8ac673d5a8ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0610", "type": "published-proof-of-concept", "source": "Telegram/LfNUE2fwHnu2-3dVBblo1I-BnIcto9mV62Zw57u_hU8NENo", "content": "", "creation_timestamp": "2025-09-04T21:00:04.000000Z"}, {"uuid": "f965f829-2eef-4a22-856a-eec392f6e5d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0610", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/59541", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1a\ud83d\udd0d Create a safe lab environment for testing CVE-2020-0610, a critical RCE vulnerability in Windows RD Gateway, with minimal disruption using DTLS techniques.\nURL\uff1ahttps://github.com/RyuHiro23/EXPLOTACI-N-Y-DEFENSA-DE-APIS-VULNERABLES-DAMN-VULNERABLE-RESTAURANT-API-GAME-\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2025-11-13T12:47:33.000000Z"}, {"uuid": "d132be57-8b8b-4ba0-a690-3dc54f6966b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0610", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/59542", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1a\ud83d\udd0d Create a safe lab environment for testing CVE-2020-0610, a critical RCE vulnerability in Windows RD Gateway, with minimal disruption using DTLS techniques.\nURL\uff1ahttps://github.com/RyuHiro23/EXPLOTACI-N-Y-DEFENSA-DE-APIS-VULNERABLES-DAMN-VULNERABLE-RESTAURANT-API-GAME\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2025-11-13T13:07:42.000000Z"}, {"uuid": "3b8d3444-3ef5-4653-a7f8-105022a80b3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0610", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/50247", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1a\ud83d\udd0d Create a safe lab environment for testing CVE-2020-0610, a critical RCE vulnerability in Windows RD Gateway, with minimal disruption using DTLS techniques.\nURL\uff1ahttps://github.com/Riocipta75/lab-cve-2020-0610\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2025-09-04T13:24:47.000000Z"}, {"uuid": "bd08d4c5-4c25-4354-a2d4-375f7a2b78db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0610", "type": "seen", "source": "https://t.me/N0iSeBit/365", "content": "\u041d\u0443 \u0438 \u0434\u043e \u043a\u0443\u0447\u0438 \u0441\u0435\u0433\u043e\u0434\u043d\u044f \u0435\u0449\u0435 \u0431\u044b\u043b\u0430 \u0437\u0430\u043a\u0440\u044b\u0442\u0430 \u043f\u0430\u0447\u043a\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 RDP CVE-2020-0609, CVE-2020-0610, CVE-2020-0611. \u0412\u0441\u0435 \u0431\u0435\u0436\u0438\u043c \u0441\u0442\u0430\u0432\u0438\u0442\u044c \u043f\u0430\u0442\u0447\u0438 \u0441\u043e \u0441\u0442\u0440\u0430\u0448\u043d\u043e\u0439 \u0441\u0438\u043b\u043e\u0439 \u270a\n\n\u0418\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u044b\u0439 \u0444\u0430\u043a\u0442, \u0447\u0442\u043e US Department of Homeland Security (DHS) \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b \u0441\u0440\u043e\u0447\u043d\u0443\u044e \u0434\u0438\u0440\u0435\u043a\u0442\u0438\u0432\u0443 (Emergency Directive 20-02 ) \u043f\u043e \u0442\u043e\u0442\u0430\u043b\u044c\u043d\u043e\u043c\u0443 \u043f\u0430\u0442\u0447\u0438\u043d\u0433\u0443 \u0432\u0441\u0435\u0445 \u044d\u0442\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439.\n\n\ud83d\udc49 https://cyber.dhs.gov/assets/report/ed-20-02.pdf\n\n\u041d\u0435 \u0437\u0430\u0442\u044f\u0433\u0438\u0432\u0430\u0439\u0442\u0435 \u0441 \u043f\u0430\u0442\u0447\u0430\u043c\u0438! \ud83d\ude31", "creation_timestamp": "2020-01-15T01:02:21.000000Z"}, {"uuid": "249bb622-ec27-49d4-8b08-42405b568a22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0610", "type": "published-proof-of-concept", "source": "https://t.me/BleepingComputer/6659", "content": "DOS Exploit PoC Released for Critical Windows RDP Gateway Bugs\n\nA proof-of-concept (PoC) denial of service exploit has been published by Danish security researcher Ollypwn for the\u00a0CVE-2020-0609\u00a0and\u00a0CVE-2020-0610\u00a0flaws affecting the Remote Desktop Gateway (RD Gateway) component on Windows Server (2012,\u00a02012 R2, 2016, and 2019) devices. [...]\n\nhttps://www.bleepingcomputer.com/news/security/dos-exploit-poc-released-for-critical-windows-rdp-gateway-bugs/", "creation_timestamp": "2020-01-24T20:54:26.000000Z"}, {"uuid": "20c0f794-8c3f-4b1f-ae40-dbd6d9256869", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0610", "type": "seen", "source": "https://t.me/cybershit/653", "content": "\u041a\u0441\u0442\u0430\u0442\u0438, \u043f\u043e\u043c\u0438\u043c\u043e CVE-2020-0601, \u0432 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u043c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 Microsoft \u0442\u0430\u043a\u0436\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0438 RCE \u0432 Windows Remote Desktop Gateway (CVE-2020-0609, CVE-2020-0610) \u0438 Remote Desktop Client (CVE-2020-0611), \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0442 \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 Windows 7 \u0438 Server 2008 R2, \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0441 \u0441\u0435\u0433\u043e\u0434\u043d\u044f\u0448\u043d\u0435\u0433\u043e \u0434\u043d\u044f \u043e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043f\u0440\u0435\u043a\u0440\u0430\u0449\u0435\u043d\u0430.\n\nhttps://www.us-cert.gov/ncas/alerts/aa20-014a", "creation_timestamp": "2020-01-15T08:34:29.000000Z"}, {"uuid": "99e05413-a7ed-4703-917d-70d9bcf0833d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0610", "type": "published-proof-of-concept", "source": "https://t.me/canyoupwnme/6269", "content": "BlueGate\nPoC (DoS) for CVE-2020-0609 &amp; CVE-2020-0610 - RD Gateway RCE\nhttps://github.com/ollypwn/BlueGate", "creation_timestamp": "2020-01-24T09:03:43.000000Z"}, {"uuid": "de1c8dc9-1a53-4292-8bc2-0a74e6262eda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0610", "type": "published-proof-of-concept", "source": "https://t.me/SecLabNews/6715", "content": "\u041d\u0438\u0434\u0435\u0440\u043b\u0430\u043d\u0434\u0441\u043a\u0438\u0439 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0438\u0439 \u043f\u0441\u0435\u0432\u0434\u043e\u043d\u0438\u043c Ollypwn, \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b PoC-\u043a\u043e\u0434\u044b \u0434\u043b\u044f \u0434\u0432\u0443\u0445 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 (CVE-2020-0609 \u0438 CVE-2020-0610) \u0432 \u0448\u043b\u044e\u0437\u043e\u0432\u043e\u043c \u0441\u0435\u0440\u0432\u0435\u0440\u0435 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0440\u0430\u0431\u043e\u0447\u0435\u0433\u043e \u0441\u0442\u043e\u043b\u0430 Windows RD Gateway \u0432 Windows Server (2012, 2012 R2, 2016 \u0438 2019).\n\n\n\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u044b \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u044b \u0434\u043b\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 Windows RD Gateway", "creation_timestamp": "2020-01-26T11:50:02.000000Z"}, {"uuid": "b1e10158-a09d-431c-8a3b-6608a4788358", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0610", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/552", "content": "#Red_Team_Tactics\nBlueGate:\nPoC (DoS + scanner) for CVE-2020-0609, CVE-2020-0610 - RD Gateway RCE\nhttps://github.com/ollypwn/BlueGate", "creation_timestamp": "2025-03-09T17:58:47.000000Z"}]}