Blog

Pradeep Kulkarni
The Remote Desktop Protocol Vulnerability – ‘CVE-2012-0002’ is not dead yet!
December 13, 2016

remote-desktop-protocol-vulnerability

On March 13, 2012, Microsoft disclosed the details of a ‘critical vulnerability’ called Remote Desktop Protocol Vulnerability – CVE-2012-0002 in its bulletin. And even four years after this vulnerability was patched, it is still being exploited in the wild by attackers to carry out ‘Remote Code Execution’ on their victims computers.

Affected Operating Systems:

  • Microsoft Windows XP SP2 and SP3
  • Windows Server 2003 SP2
  • Windows Vista SP2
  • Windows Server 2008 SP2, R2, and R2 SP1
  • Windows 7 Gold and SP1

Reportedly, various exploit framework and public advisories are known to host reliable exploit code for the vulnerability (CVE-2012-0002). This helps even the most novice of hackers to exploit this vulnerability – all they have to do is fingerprint the victim’s machine that is having the RDP port 3389 open.

Vulnerability

While handling the ‘maxChannelIds’ field of the ‘ConnectMCSPDU’ request, a ‘use-after-free vulnerability’ is triggered leading to a remote code execution in the RDP server. The complete technical disclosure of this vulnerability can be found here.

Fig 1. CVE-2012-0002

Fig 1. CVE-2012-0002

IPS Hits Trend

As observed in Quick Heal Labs, below is the trend of the exploitation of this vulnerability over the last four months.

Fig 2. Exploitation of CVE-2012-0002

Fig 2. Exploitation of CVE-2012-0002

– 11 Nov and 12 Dec 2016 shows a spike in the activity.

Recent Threat Actors

As observed, the machines affected by CVE-2012-0002 were connected to the Internet and had the RDP port 3389 open for outside access. Keeping ports of important services open to external access is an extremely unsafe practice and we strongly recommend against it.

Following are some of the attackers’ IPs that were observed to exploit the vulnerability (CVE-2012-0002).

Attacker IP
• 183.207.184.195
• 123.30.236.140
• 124.65.37.50
• 188.247.20.104
• 202.130.106.17
• 46.100.50.204
• 62.210.211.86
• 80.58.182.245
• 61.160.166.23
• 120.27.7.118

Most of the above IPs have been blacklisted on various online malicious IP scanners such as www.abuseipdb.com

Example – https://www.abuseipdb.com/check/62.210.211.86

Quick Heal Detections

Quick Heal has released below the IPS detection for CVE-2012-0002.

  • VID-00114: [MS12-020] Microsoft RDP Remote Code Execution Vulnerability
  • VID-00116: [MS12-020] Microsoft RDP Remote Code Execution Vulnerability
  • VID-00117: [MS12-020] Microsoft RDP Remote Code Execution Vulnerability

Furthermore, many ransomware attacks were carried out using RDP brute force attempts. And to deal with these attacks, the below IPS detections were released recently.

  • VID-01087: RDP Brute force attack detection
  • VID-01088: RDP Brute force attack detection
  • VID-01089: RDP Brute force attack detection
  • VID-01090: RDP Brute force attack detection
  • VID-01092: RDP Brute force attack detection

Despite being patched four years ago, the vulnerability (CVE-2012-0002) is still being used by attackers to target unpatched Remote Desktop Service on Windows Operating systems. This only warrants the need for users to keep their OS updated with all the recommended security updates and use a multilayered security software such as Quick Heal.

Also Read:

ACKNOWLEDGMENT

Subject Matter Expert
– Pradeep Kulkarni (Threat Research & Response Team)
– Swapnil Mahajan (Product Development Team)

Have something to add to this story? Share it in the comments.

Pradeep Kulkarni
About Pradeep Kulkarni
Pradeep Kulkarni is leading the IPS team in Quick Heal Technologies Limited. Having worked in the IT security industry for over 11 years, he has worked on various...
Articles by Pradeep Kulkarni »

No Comments, Be The First!

Your email address will not be published.

CAPTCHA Image