CVE-2014-0296
The Remote Desktop Protocol (RDP) implementation in Microsoft Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 does not properly encrypt sessions, which makes it easier for man-in-the-middle attackers to obtain sensitive information by sniffing the network or modify session content by sending crafted RDP packets, aka "RDP MAC Vulnerability."
View on NVDSeverity
N/A
EPSS
Probability of exploitation (next 30 days): 0.2987 (29.9%)
Percentile: 96.7%
EPSS: 2026-05-06
Affects
microsoft:windows_7microsoft:windows_8microsoft:windows_8.1microsoft:windows_server_2012Technical description
The Remote Desktop Protocol (RDP) implementation in Microsoft Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 does not properly encrypt sessions, which makes it easier for man-in-the-middle attackers to obtain sensitive information by sniffing the network or modify session content by sending crafted RDP packets, aka "RDP MAC Vulnerability."
Published: 6/11/2014, 4:56:16 AM
Last modified: 5/6/2026, 10:30:45 PM
References
- http://blogs.technet.com/b/srd/archive/2014/06/10/assessing-risk-for-the-june-2014-security-updates.aspx
- http://secunia.com/advisories/58524
- http://www.securityfocus.com/bid/67865
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-030
- http://blogs.technet.com/b/srd/archive/2014/06/10/assessing-risk-for-the-june-2014-security-updates.aspx
- http://secunia.com/advisories/58524
- http://www.securityfocus.com/bid/67865
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-030