Level 31
Multiple major vulnerabilities were discovered in the Remote Desktop Protocol (RDP) protocol which can allow bad actors to take control of computers connecting to a malicious server using remote code execution and memory corruption.

As discovered by Check Point Research, although most users don't even think twice when connecting to remote computers, RDP vulnerabilities can be exploited to allow attackers to connect from the server to the client as part of a so-called "reverse RDP attack."

Once the would-be attackers get a foothold on the RDP client using one of the just-discovered RDP vulnerabilities, they can expand the scope of the attack to the machine's entire local network.
The RDP protocol is designed to provide users with the means to connect to a computer over a network connection via a graphical interface, usually used to remotely connect to Windows machines.