Service Notices

All Notices > Security Notices > Apache Guacamole Reverse RDP Remote Code Execution Vulnerability (CVE-2020-9497/9498)

Apache Guacamole Reverse RDP Remote Code Execution Vulnerability (CVE-2020-9497/9498)

Jul 03, 2020 GMT+08:00

I. Overview

Apache Spark has recently disclosed a reverse RDP remote code execution vulnerability in Apache Guacamole versions earlier than 1.2.0. Apache Guacamole, a remote desktop application, is often used to remotely access and manage Windows and Linux operating systems. In affected versions, attackers can exploit these vulnerabilities to remotely execute code and disclose sensitive information.

CVE-2020-9497: Affected Apache Guacamole versions do not properly validate data received from RDP servers via static virtual channels. If a user connects to a malicious or compromised RDP server, specially-crafted PDUs could result in disclosure of information within the memory of the guacd process handling the connection.

CVE-2020-9498: Affected Apache Guacamole versions may mishandle pointers involved in processing data received via RDP static virtual channels. If a user connects to a malicious or compromised RDP server, a series of specially-crafted PDUs could result in arbitrary code execution on the target system.

If you are an Apache Guacamole user, check your versions and implement timely security hardening.

For more information about this vulnerability, visit the following website:

https://guacamole.apache.org/security/

https://research.checkpoint.com/2020/apache-guacamole-rce/

II. Severity

Severity: important

(Severity: low, moderate, important, and critical)

III. Affected Products

Affected versions:

Apache Guacamole versions earlier than 1.2.0

Secure versions:

Apache Guacamole 1.2.0

IV. Vulnerability Handling

This vulnerability has been fixed in the latest official release 1.2.0. If your version falls into the affected range, upgrade it to the latest secure version.

Download link:

https://guacamole.apache.org/releases/1.2.0/

Note: Before fixing vulnerabilities, back up your files and conduct a thorough test.