Blog | G5 Cyber Security

Reverse RDP Attack Also Enables Guest-to-Host Escape in Microsoft Hyper-V

Microsoft silently patched this vulnerability (CVE-2019-0887) just last month as part of its July Patch Tuesday updates. Microsoft’s Hyper-V Manager, behind the scenes, uses the same implementation as of Windows Remote Desktop Services to let the host machine connect to a guest virtual machine and share synchronized resources like clipboard data. The Enhanced Session Mode in Microsoft’s Windows built-in RDP Manager also inherits all of the security vulnerabilities reside in Windows RDP, including clipboard hijacking and path-traversal vulnerabilities.

Source: https://thehackernews.com/2019/08/reverse-rdp-windows-hyper-v.html

Exit mobile version