-
There’s a manual workaround for the RD Gateway security holes, CVE-2020-0609 and -0610
Marcus Hitchins has come up with a way to subvert the vulnerabilities described in this month’s Remote Desktop Gateway fixes CVE-2020-0609 and CVE-2020-0610.
(Protip: If you aren’t in charge of a RD Gateway network, forget about it.)
Posting on the KryptosLogic site, he gives manual bypass details:
If for whatever reason you are unable to install the patch, it is still possible to prevent exploitation of these vulnerabilities. RDG supports the HTTP, HTTPS, and UDP protocols, but the vulnerabilities only exist in the code responsible for handling UDP. Simply disabling UDP Transport, or firewalling the UDP port (usually port 3391) is sufficient to prevent exploitation.
Kevin Beaumont notes that it’ll involve a performance hit.
Thx Florian Roth.