An attacker who successfully exploited this vulnerability could potentially access confidential data or cause denial-of-service on the affected host.

Users whose operating system is not patched and users with default or weak credentials, such as those using a shared host or public Wi-Fi, are particularly vulnerable.

This vulnerability has been verified to affect Windows 7, Windows 8, Windows 10, and Windows Server 2012, 2016, and 2018. This issue was publicly disclosed on June 1, 2018. Microsoft released software updates to address this vulnerability on June 13, 2018.
Shodan alerts for Windows 7, Windows 8, Windows 10, and Windows Server 2012, 2016, and 2018.

CVE-2018-0878: Windows Remote Desktop Protocol Session Redirection Elevation of Privilege Vulnerability.
With the release of Windows 10 version 1803, Microsoft added support for RD session redirection to the Remote Desktop Protocol (RDP). The addition of RD session redirection support in Windows 10 version 1803 makes it possible for attackers to take advantage of CVE-2018-0878.
If an attacker is able to access the RDP session of an affected Windows 10 version 1803 system, they could redirect the victim’s session to a malicious RDP server and execute arbitrary code with SYSTEM privileges.
This issue was disclosed publicly on March 6, 2018. Microsoft released software updates to address this vulnerability on March 21, 2018.Shodan alerts for Windows 10 version 1803 and

Windows Server 2016

Microsoft has released security advisories for CVE-2018-0878.

Windows Server 2016 and Windows Server 2012

With the release of Windows 10 version 1803, Microsoft added support for RD session redirection to the Remote Desktop Protocol (RDP). The addition of RD session redirection support in Windows 10 version 1803 makes it possible for attackers to take advantage of CVE-2018-0878.
If an attacker is able to access the RDP session of an affected Windows 10 version 1803 system, they could redirect the victim’s session to a malicious RDP server and execute arbitrary code with SYSTEM privileges.
This issue was disclosed publicly on March 6, 2018. Microsoft released software updates to address this vulnerability on March 21, 2018.
Shodan alerts for Windows 10 version 1803 and

Windows Server 2012 and 2016

Microsoft has released an update for Windows Server 2012 and 2016 to address this vulnerability which was disclosed publicly on March 6, 2018.
Shodan alerts for Windows 10 version 1803 and Windows Server 2012, 2016, and 2018.

Windows Server 2012 and 2012 R2

, 2016, and 2018
CVE-2018-0878: Windows Remote Desktop Protocol Session Redirection Elevation of Privilege Vulnerability.
With the release of Windows 10 version 1803, Microsoft added support for RD session redirection to the Remote Desktop Protocol (RDP). The addition of RD session redirection support in Windows 10 version 1803 makes it possible for attackers to take advantage of CVE-2018-0878.
If an attacker is able to access the RDP session of an affected Windows 10 version 1803 system, they could redirect the victim’s session to a malicious RDP server and execute arbitrary code with SYSTEM privileges.
This issue was disclosed publicly on March 6, 2018. Microsoft released software updates to address this vulnerability on March 21, 2018.Shodan alerts for Windows 10 version 1803 and

Timeline

Published on: 11/09/2022 22:15:00 UTC

References