Is it enough to deactivate RDP to avoid RPD exploits?RemoteApp .rdp embed creds?Xen virtualized Server 2K8R2 w/ SQL 2K8 becomming unresponsiveConvenient source for information on known exploits (not theoretical)Securing RDP access to Windows Server 2008 R2: is Network Level Authentication enough?Send Ctrl-Alt-Del to nested RDP sessionKB2667402 update fails to install with 0x80004005. Yet it's also showing as installedDeactivate Win XP SP3openVAS - Microsoft RDP Server Private Key Information Disclosure Vulnerability - false Alarm?Windows Rdp stopped workingUnderstanding & Resolving Web Server Exploits

Multi tool use
Multi tool use

How can an eldritch abomination hide its true form in public?

Can you use a concentration spell while using Mantle of Majesty?

Bringing Food from Hometown for Out-of-Town Interview?

Scala list with same adjacent values

The qvolume of an integer

Does Peach's float negate shorthop knockback multipliers?

How can I grammatically understand "Wir über uns"?

Why use water tanks from a retired Space Shuttle?

Singlequote and backslash

Looking after a wayward brother in mother's will

Is the world in Game of Thrones spherical or flat?

What is a simple, physical situation where complex numbers emerge naturally?

Applicants clearly not having the skills they advertise

Is the capacitor drawn or wired wrongly?

Are academic associations obliged to comply with the US government?

Does a component pouch automatically contain components?

Why does the UK have more political parties than the US?

Do adult Russians normally hand-write Cyrillic as cursive or as block letters?

What is the right way to float a home lab?

Can a helicopter mask itself from Radar?

Beginner's snake game using PyGame

The term for the person/group a political party aligns themselves with to appear concerned about the general public

Should this code fail to compile in C++17?

Can an old DSLR be upgraded to match modern smartphone image quality



Is it enough to deactivate RDP to avoid RPD exploits?


RemoteApp .rdp embed creds?Xen virtualized Server 2K8R2 w/ SQL 2K8 becomming unresponsiveConvenient source for information on known exploits (not theoretical)Securing RDP access to Windows Server 2008 R2: is Network Level Authentication enough?Send Ctrl-Alt-Del to nested RDP sessionKB2667402 update fails to install with 0x80004005. Yet it's also showing as installedDeactivate Win XP SP3openVAS - Microsoft RDP Server Private Key Information Disclosure Vulnerability - false Alarm?Windows Rdp stopped workingUnderstanding & Resolving Web Server Exploits






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty height:90px;width:728px;box-sizing:border-box;








0















I just got word about the newest known vulnerability of the RDP service. 2 Days ago microsoft made a blog post about it and delivered updates. OS wise even for windows xp.



From what I understand the vulnerability seems to come into effect, before there is any attempt to authentificate the connection / user as authentification does not affect it. The patch microsoft delivered should eliminate the problem.



Still though I'm wondering if it is already enough to "just" deactivate the RDP service to avoid being vulnerable to this kind of vulnerability?
(naturally this does not circumvent having to apply the patch in the end).










share|improve this question






















  • Yes having no port/service to connect to mitigates the exploit

    – Drifter104
    May 16 at 9:02











  • tnx @Drifter104 I was just not sure if its enough or not (the patch page wasn't 100% clear for me nor my collegues).

    – Thomas
    May 16 at 9:12

















0















I just got word about the newest known vulnerability of the RDP service. 2 Days ago microsoft made a blog post about it and delivered updates. OS wise even for windows xp.



From what I understand the vulnerability seems to come into effect, before there is any attempt to authentificate the connection / user as authentification does not affect it. The patch microsoft delivered should eliminate the problem.



Still though I'm wondering if it is already enough to "just" deactivate the RDP service to avoid being vulnerable to this kind of vulnerability?
(naturally this does not circumvent having to apply the patch in the end).










share|improve this question






















  • Yes having no port/service to connect to mitigates the exploit

    – Drifter104
    May 16 at 9:02











  • tnx @Drifter104 I was just not sure if its enough or not (the patch page wasn't 100% clear for me nor my collegues).

    – Thomas
    May 16 at 9:12













0












0








0


1






I just got word about the newest known vulnerability of the RDP service. 2 Days ago microsoft made a blog post about it and delivered updates. OS wise even for windows xp.



From what I understand the vulnerability seems to come into effect, before there is any attempt to authentificate the connection / user as authentification does not affect it. The patch microsoft delivered should eliminate the problem.



Still though I'm wondering if it is already enough to "just" deactivate the RDP service to avoid being vulnerable to this kind of vulnerability?
(naturally this does not circumvent having to apply the patch in the end).










share|improve this question














I just got word about the newest known vulnerability of the RDP service. 2 Days ago microsoft made a blog post about it and delivered updates. OS wise even for windows xp.



From what I understand the vulnerability seems to come into effect, before there is any attempt to authentificate the connection / user as authentification does not affect it. The patch microsoft delivered should eliminate the problem.



Still though I'm wondering if it is already enough to "just" deactivate the RDP service to avoid being vulnerable to this kind of vulnerability?
(naturally this does not circumvent having to apply the patch in the end).







windows-server-2008-r2 windows-xp rdp vulnerabilities






share|improve this question













share|improve this question











share|improve this question




share|improve this question










asked May 16 at 8:47









ThomasThomas

1031




1031












  • Yes having no port/service to connect to mitigates the exploit

    – Drifter104
    May 16 at 9:02











  • tnx @Drifter104 I was just not sure if its enough or not (the patch page wasn't 100% clear for me nor my collegues).

    – Thomas
    May 16 at 9:12

















  • Yes having no port/service to connect to mitigates the exploit

    – Drifter104
    May 16 at 9:02











  • tnx @Drifter104 I was just not sure if its enough or not (the patch page wasn't 100% clear for me nor my collegues).

    – Thomas
    May 16 at 9:12
















Yes having no port/service to connect to mitigates the exploit

– Drifter104
May 16 at 9:02





Yes having no port/service to connect to mitigates the exploit

– Drifter104
May 16 at 9:02













tnx @Drifter104 I was just not sure if its enough or not (the patch page wasn't 100% clear for me nor my collegues).

– Thomas
May 16 at 9:12





tnx @Drifter104 I was just not sure if its enough or not (the patch page wasn't 100% clear for me nor my collegues).

– Thomas
May 16 at 9:12










1 Answer
1






active

oldest

votes


















0














The security bulletin for CVE-2019-0708 answers this question: yes, disabling Remote Desktop Services mitigates the issue.



In fact, just turning on Network Level Authentication protects you from unauthenticated attacks. (Whether this is a sufficient mitigation depends on your circumstances.)






share|improve this answer























    Your Answer








    StackExchange.ready(function()
    var channelOptions =
    tags: "".split(" "),
    id: "2"
    ;
    initTagRenderer("".split(" "), "".split(" "), channelOptions);

    StackExchange.using("externalEditor", function()
    // Have to fire editor after snippets, if snippets enabled
    if (StackExchange.settings.snippets.snippetsEnabled)
    StackExchange.using("snippets", function()
    createEditor();
    );

    else
    createEditor();

    );

    function createEditor()
    StackExchange.prepareEditor(
    heartbeatType: 'answer',
    autoActivateHeartbeat: false,
    convertImagesToLinks: true,
    noModals: true,
    showLowRepImageUploadWarning: true,
    reputationToPostImages: 10,
    bindNavPrevention: true,
    postfix: "",
    imageUploader:
    brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
    contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
    allowUrls: true
    ,
    onDemand: true,
    discardSelector: ".discard-answer"
    ,immediatelyShowMarkdownHelp:true
    );



    );













    draft saved

    draft discarded


















    StackExchange.ready(
    function ()
    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f967535%2fis-it-enough-to-deactivate-rdp-to-avoid-rpd-exploits%23new-answer', 'question_page');

    );

    Post as a guest















    Required, but never shown

























    1 Answer
    1






    active

    oldest

    votes








    1 Answer
    1






    active

    oldest

    votes









    active

    oldest

    votes






    active

    oldest

    votes









    0














    The security bulletin for CVE-2019-0708 answers this question: yes, disabling Remote Desktop Services mitigates the issue.



    In fact, just turning on Network Level Authentication protects you from unauthenticated attacks. (Whether this is a sufficient mitigation depends on your circumstances.)






    share|improve this answer



























      0














      The security bulletin for CVE-2019-0708 answers this question: yes, disabling Remote Desktop Services mitigates the issue.



      In fact, just turning on Network Level Authentication protects you from unauthenticated attacks. (Whether this is a sufficient mitigation depends on your circumstances.)






      share|improve this answer

























        0












        0








        0







        The security bulletin for CVE-2019-0708 answers this question: yes, disabling Remote Desktop Services mitigates the issue.



        In fact, just turning on Network Level Authentication protects you from unauthenticated attacks. (Whether this is a sufficient mitigation depends on your circumstances.)






        share|improve this answer













        The security bulletin for CVE-2019-0708 answers this question: yes, disabling Remote Desktop Services mitigates the issue.



        In fact, just turning on Network Level Authentication protects you from unauthenticated attacks. (Whether this is a sufficient mitigation depends on your circumstances.)







        share|improve this answer












        share|improve this answer



        share|improve this answer










        answered May 17 at 0:47









        Harry JohnstonHarry Johnston

        4,18012040




        4,18012040



























            draft saved

            draft discarded
















































            Thanks for contributing an answer to Server Fault!


            • Please be sure to answer the question. Provide details and share your research!

            But avoid


            • Asking for help, clarification, or responding to other answers.

            • Making statements based on opinion; back them up with references or personal experience.

            To learn more, see our tips on writing great answers.




            draft saved


            draft discarded














            StackExchange.ready(
            function ()
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f967535%2fis-it-enough-to-deactivate-rdp-to-avoid-rpd-exploits%23new-answer', 'question_page');

            );

            Post as a guest















            Required, but never shown





















































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown

































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown







            FWqz,aldbg,yzKhBEWHq4bWoKispcjVsanh5KDOl 2GM9Z3jRK3To,JFlbEXJGkihnGGtZk,7N0k
            njjqsPx

            Popular posts from this blog

            RemoteApp sporadic failureWindows 2008 RemoteAPP client disconnects within a matter of minutesWhat is the minimum version of RDP supported by Server 2012 RDS?How to configure a Remoteapp server to increase stabilityMicrosoft RemoteApp Active SessionRDWeb TS connection broken for some users post RemoteApp certificate changeRemote Desktop Licensing, RemoteAPPRDS 2012 R2 some users are not able to logon after changed date and time on Connection BrokersWhat happens during Remote Desktop logon, and is there any logging?After installing RDS on WinServer 2016 I still can only connect with two users?RD Connection via RDGW to Session host is not connecting

            Vilaño, A Laracha Índice Patrimonio | Lugares e parroquias | Véxase tamén | Menú de navegación43°14′52″N 8°36′03″O / 43.24775, -8.60070

            Cegueira Índice Epidemioloxía | Deficiencia visual | Tipos de cegueira | Principais causas de cegueira | Tratamento | Técnicas de adaptación e axudas | Vida dos cegos | Primeiros auxilios | Crenzas respecto das persoas cegas | Crenzas das persoas cegas | O neno deficiente visual | Aspectos psicolóxicos da cegueira | Notas | Véxase tamén | Menú de navegación54.054.154.436928256blindnessDicionario da Real Academia GalegaPortal das Palabras"International Standards: Visual Standards — Aspects and Ranges of Vision Loss with Emphasis on Population Surveys.""Visual impairment and blindness""Presentan un plan para previr a cegueira"o orixinalACCDV Associació Catalana de Cecs i Disminuïts Visuals - PMFTrachoma"Effect of gene therapy on visual function in Leber's congenital amaurosis"1844137110.1056/NEJMoa0802268Cans guía - os mellores amigos dos cegosArquivadoEscola de cans guía para cegos en Mortágua, PortugalArquivado"Tecnología para ciegos y deficientes visuales. Recopilación de recursos gratuitos en la Red""Colorino""‘COL.diesis’, escuchar los sonidos del color""COL.diesis: Transforming Colour into Melody and Implementing the Result in a Colour Sensor Device"o orixinal"Sistema de desarrollo de sinestesia color-sonido para invidentes utilizando un protocolo de audio""Enseñanza táctil - geometría y color. Juegos didácticos para niños ciegos y videntes""Sistema Constanz"L'ocupació laboral dels cecs a l'Estat espanyol està pràcticament equiparada a la de les persones amb visió, entrevista amb Pedro ZuritaONCE (Organización Nacional de Cegos de España)Prevención da cegueiraDescrición de deficiencias visuais (Disc@pnet)Braillín, un boneco atractivo para calquera neno, con ou sen discapacidade, que permite familiarizarse co sistema de escritura e lectura brailleAxudas Técnicas36838ID00897494007150-90057129528256DOID:1432HP:0000618D001766C10.597.751.941.162C97109C0155020