New POCs for Vulnerabilities in RD Gateway were Published Recently
A proof of concept exploit for a denial of service vulnerabilities (CVE-2020-0609 and CVE-2020-0610) in the Remote Desktop Gateway (RD Gateway) component on Windows Server (2012, 2012 R2, 2016, and 2019) devices was published recently. The two vulnerabilities are dubbed BlueGate and were patched by Microsoft as part of January Patch Tuesday. RD Gateway is used to fence off Remote Desktop servers on internal networks from Internet connections and to only allow the ones that successfully authenticate on the gateway to reach the server. RDG supports three different protocols: HTTP, HTTPS, and UDP. The updated function in the recent update made by Microsoft prior to the discovery of the flaws is responsible for handling the UDP protocol. The RDG UDP protocol allows for large messages to be split across multiple separate UDP packets. Due to the property that UDP is connectionless, packets can arrive out of order. The job of this function is to re-assemble messages, ensuring each part is in the correct place. Once exploited, the vulnerabilities can allow an unauthenticated attacker that connects to the target system using RDP, executing arbitrary code. According to Microsoft, these vulnerabilities are pre-authentication and requires no user interaction. In addition, the vulnerability only affects UDP transport, which by default runs on UDP port 3391.





