Is it enough to deactivate RDP to avoid RPD exploits?RemoteApp .rdp embed creds?Xen virtualized Server 2K8R2 w/ SQL 2K8 becomming unresponsiveConvenient source for information on known exploits (not theoretical)Securing RDP access to Windows Server 2008 R2: is Network Level Authentication enough?Send Ctrl-Alt-Del to nested RDP sessionKB2667402 update fails to install with 0x80004005. Yet it's also showing as installedDeactivate Win XP SP3openVAS - Microsoft RDP Server Private Key Information Disclosure Vulnerability - false Alarm?Windows Rdp stopped workingUnderstanding & Resolving Web Server Exploits

How can an eldritch abomination hide its true form in public?

Can you use a concentration spell while using Mantle of Majesty?

Bringing Food from Hometown for Out-of-Town Interview?

Scala list with same adjacent values

The qvolume of an integer

Does Peach's float negate shorthop knockback multipliers?

How can I grammatically understand "Wir über uns"?

Why use water tanks from a retired Space Shuttle?

Singlequote and backslash

Looking after a wayward brother in mother's will

Is the world in Game of Thrones spherical or flat?

What is a simple, physical situation where complex numbers emerge naturally?

Applicants clearly not having the skills they advertise

Is the capacitor drawn or wired wrongly?

Are academic associations obliged to comply with the US government?

Does a component pouch automatically contain components?

Why does the UK have more political parties than the US?

Do adult Russians normally hand-write Cyrillic as cursive or as block letters?

What is the right way to float a home lab?

Can a helicopter mask itself from Radar?

Beginner's snake game using PyGame

The term for the person/group a political party aligns themselves with to appear concerned about the general public

Should this code fail to compile in C++17?

Can an old DSLR be upgraded to match modern smartphone image quality



Is it enough to deactivate RDP to avoid RPD exploits?


RemoteApp .rdp embed creds?Xen virtualized Server 2K8R2 w/ SQL 2K8 becomming unresponsiveConvenient source for information on known exploits (not theoretical)Securing RDP access to Windows Server 2008 R2: is Network Level Authentication enough?Send Ctrl-Alt-Del to nested RDP sessionKB2667402 update fails to install with 0x80004005. Yet it's also showing as installedDeactivate Win XP SP3openVAS - Microsoft RDP Server Private Key Information Disclosure Vulnerability - false Alarm?Windows Rdp stopped workingUnderstanding & Resolving Web Server Exploits






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty height:90px;width:728px;box-sizing:border-box;








0















I just got word about the newest known vulnerability of the RDP service. 2 Days ago microsoft made a blog post about it and delivered updates. OS wise even for windows xp.



From what I understand the vulnerability seems to come into effect, before there is any attempt to authentificate the connection / user as authentification does not affect it. The patch microsoft delivered should eliminate the problem.



Still though I'm wondering if it is already enough to "just" deactivate the RDP service to avoid being vulnerable to this kind of vulnerability?
(naturally this does not circumvent having to apply the patch in the end).










share|improve this question






















  • Yes having no port/service to connect to mitigates the exploit

    – Drifter104
    May 16 at 9:02











  • tnx @Drifter104 I was just not sure if its enough or not (the patch page wasn't 100% clear for me nor my collegues).

    – Thomas
    May 16 at 9:12

















0















I just got word about the newest known vulnerability of the RDP service. 2 Days ago microsoft made a blog post about it and delivered updates. OS wise even for windows xp.



From what I understand the vulnerability seems to come into effect, before there is any attempt to authentificate the connection / user as authentification does not affect it. The patch microsoft delivered should eliminate the problem.



Still though I'm wondering if it is already enough to "just" deactivate the RDP service to avoid being vulnerable to this kind of vulnerability?
(naturally this does not circumvent having to apply the patch in the end).










share|improve this question






















  • Yes having no port/service to connect to mitigates the exploit

    – Drifter104
    May 16 at 9:02











  • tnx @Drifter104 I was just not sure if its enough or not (the patch page wasn't 100% clear for me nor my collegues).

    – Thomas
    May 16 at 9:12













0












0








0


1






I just got word about the newest known vulnerability of the RDP service. 2 Days ago microsoft made a blog post about it and delivered updates. OS wise even for windows xp.



From what I understand the vulnerability seems to come into effect, before there is any attempt to authentificate the connection / user as authentification does not affect it. The patch microsoft delivered should eliminate the problem.



Still though I'm wondering if it is already enough to "just" deactivate the RDP service to avoid being vulnerable to this kind of vulnerability?
(naturally this does not circumvent having to apply the patch in the end).










share|improve this question














I just got word about the newest known vulnerability of the RDP service. 2 Days ago microsoft made a blog post about it and delivered updates. OS wise even for windows xp.



From what I understand the vulnerability seems to come into effect, before there is any attempt to authentificate the connection / user as authentification does not affect it. The patch microsoft delivered should eliminate the problem.



Still though I'm wondering if it is already enough to "just" deactivate the RDP service to avoid being vulnerable to this kind of vulnerability?
(naturally this does not circumvent having to apply the patch in the end).







windows-server-2008-r2 windows-xp rdp vulnerabilities






share|improve this question













share|improve this question











share|improve this question




share|improve this question










asked May 16 at 8:47









ThomasThomas

1031




1031












  • Yes having no port/service to connect to mitigates the exploit

    – Drifter104
    May 16 at 9:02











  • tnx @Drifter104 I was just not sure if its enough or not (the patch page wasn't 100% clear for me nor my collegues).

    – Thomas
    May 16 at 9:12

















  • Yes having no port/service to connect to mitigates the exploit

    – Drifter104
    May 16 at 9:02











  • tnx @Drifter104 I was just not sure if its enough or not (the patch page wasn't 100% clear for me nor my collegues).

    – Thomas
    May 16 at 9:12
















Yes having no port/service to connect to mitigates the exploit

– Drifter104
May 16 at 9:02





Yes having no port/service to connect to mitigates the exploit

– Drifter104
May 16 at 9:02













tnx @Drifter104 I was just not sure if its enough or not (the patch page wasn't 100% clear for me nor my collegues).

– Thomas
May 16 at 9:12





tnx @Drifter104 I was just not sure if its enough or not (the patch page wasn't 100% clear for me nor my collegues).

– Thomas
May 16 at 9:12










1 Answer
1






active

oldest

votes


















0














The security bulletin for CVE-2019-0708 answers this question: yes, disabling Remote Desktop Services mitigates the issue.



In fact, just turning on Network Level Authentication protects you from unauthenticated attacks. (Whether this is a sufficient mitigation depends on your circumstances.)






share|improve this answer























    Your Answer








    StackExchange.ready(function()
    var channelOptions =
    tags: "".split(" "),
    id: "2"
    ;
    initTagRenderer("".split(" "), "".split(" "), channelOptions);

    StackExchange.using("externalEditor", function()
    // Have to fire editor after snippets, if snippets enabled
    if (StackExchange.settings.snippets.snippetsEnabled)
    StackExchange.using("snippets", function()
    createEditor();
    );

    else
    createEditor();

    );

    function createEditor()
    StackExchange.prepareEditor(
    heartbeatType: 'answer',
    autoActivateHeartbeat: false,
    convertImagesToLinks: true,
    noModals: true,
    showLowRepImageUploadWarning: true,
    reputationToPostImages: 10,
    bindNavPrevention: true,
    postfix: "",
    imageUploader:
    brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
    contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
    allowUrls: true
    ,
    onDemand: true,
    discardSelector: ".discard-answer"
    ,immediatelyShowMarkdownHelp:true
    );



    );













    draft saved

    draft discarded


















    StackExchange.ready(
    function ()
    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f967535%2fis-it-enough-to-deactivate-rdp-to-avoid-rpd-exploits%23new-answer', 'question_page');

    );

    Post as a guest















    Required, but never shown

























    1 Answer
    1






    active

    oldest

    votes








    1 Answer
    1






    active

    oldest

    votes









    active

    oldest

    votes






    active

    oldest

    votes









    0














    The security bulletin for CVE-2019-0708 answers this question: yes, disabling Remote Desktop Services mitigates the issue.



    In fact, just turning on Network Level Authentication protects you from unauthenticated attacks. (Whether this is a sufficient mitigation depends on your circumstances.)






    share|improve this answer



























      0














      The security bulletin for CVE-2019-0708 answers this question: yes, disabling Remote Desktop Services mitigates the issue.



      In fact, just turning on Network Level Authentication protects you from unauthenticated attacks. (Whether this is a sufficient mitigation depends on your circumstances.)






      share|improve this answer

























        0












        0








        0







        The security bulletin for CVE-2019-0708 answers this question: yes, disabling Remote Desktop Services mitigates the issue.



        In fact, just turning on Network Level Authentication protects you from unauthenticated attacks. (Whether this is a sufficient mitigation depends on your circumstances.)






        share|improve this answer













        The security bulletin for CVE-2019-0708 answers this question: yes, disabling Remote Desktop Services mitigates the issue.



        In fact, just turning on Network Level Authentication protects you from unauthenticated attacks. (Whether this is a sufficient mitigation depends on your circumstances.)







        share|improve this answer












        share|improve this answer



        share|improve this answer










        answered May 17 at 0:47









        Harry JohnstonHarry Johnston

        4,18012040




        4,18012040



























            draft saved

            draft discarded
















































            Thanks for contributing an answer to Server Fault!


            • Please be sure to answer the question. Provide details and share your research!

            But avoid


            • Asking for help, clarification, or responding to other answers.

            • Making statements based on opinion; back them up with references or personal experience.

            To learn more, see our tips on writing great answers.




            draft saved


            draft discarded














            StackExchange.ready(
            function ()
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f967535%2fis-it-enough-to-deactivate-rdp-to-avoid-rpd-exploits%23new-answer', 'question_page');

            );

            Post as a guest















            Required, but never shown





















































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown

































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown







            Popular posts from this blog

            Wikipedia:Vital articles Мазмуну Biography - Өмүр баян Philosophy and psychology - Философия жана психология Religion - Дин Social sciences - Коомдук илимдер Language and literature - Тил жана адабият Science - Илим Technology - Технология Arts and recreation - Искусство жана эс алуу History and geography - Тарых жана география Навигация менюсу

            Bruxelas-Capital Índice Historia | Composición | Situación lingüística | Clima | Cidades irmandadas | Notas | Véxase tamén | Menú de navegacióneO uso das linguas en Bruxelas e a situación do neerlandés"Rexión de Bruxelas Capital"o orixinalSitio da rexiónPáxina de Bruselas no sitio da Oficina de Promoción Turística de Valonia e BruxelasMapa Interactivo da Rexión de Bruxelas-CapitaleeWorldCat332144929079854441105155190212ID28008674080552-90000 0001 0666 3698n94104302ID540940339365017018237

            What should I write in an apology letter, since I have decided not to join a company after accepting an offer letterShould I keep looking after accepting a job offer?What should I do when I've been verbally told I would get an offer letter, but still haven't gotten one after 4 weeks?Do I accept an offer from a company that I am not likely to join?New job hasn't confirmed starting date and I want to give current employer as much notice as possibleHow should I address my manager in my resignation letter?HR delayed background verification, now jobless as resignedNo email communication after accepting a formal written offer. How should I phrase the call?What should I do if after receiving a verbal offer letter I am informed that my written job offer is put on hold due to some internal issues?Should I inform the current employer that I am about to resign within 1-2 weeks since I have signed the offer letter and waiting for visa?What company will do, if I send their offer letter to another company