Is it enough to deactivate RDP to avoid RPD exploits?RemoteApp .rdp embed creds?Xen virtualized Server 2K8R2 w/ SQL 2K8 becomming unresponsiveConvenient source for information on known exploits (not theoretical)Securing RDP access to Windows Server 2008 R2: is Network Level Authentication enough?Send Ctrl-Alt-Del to nested RDP sessionKB2667402 update fails to install with 0x80004005. Yet it's also showing as installedDeactivate Win XP SP3openVAS - Microsoft RDP Server Private Key Information Disclosure Vulnerability - false Alarm?Windows Rdp stopped workingUnderstanding & Resolving Web Server Exploits
How can an eldritch abomination hide its true form in public?
Can you use a concentration spell while using Mantle of Majesty?
Bringing Food from Hometown for Out-of-Town Interview?
Scala list with same adjacent values
The qvolume of an integer
Does Peach's float negate shorthop knockback multipliers?
How can I grammatically understand "Wir über uns"?
Why use water tanks from a retired Space Shuttle?
Singlequote and backslash
Looking after a wayward brother in mother's will
Is the world in Game of Thrones spherical or flat?
What is a simple, physical situation where complex numbers emerge naturally?
Applicants clearly not having the skills they advertise
Is the capacitor drawn or wired wrongly?
Are academic associations obliged to comply with the US government?
Does a component pouch automatically contain components?
Why does the UK have more political parties than the US?
Do adult Russians normally hand-write Cyrillic as cursive or as block letters?
What is the right way to float a home lab?
Can a helicopter mask itself from Radar?
Beginner's snake game using PyGame
The term for the person/group a political party aligns themselves with to appear concerned about the general public
Should this code fail to compile in C++17?
Can an old DSLR be upgraded to match modern smartphone image quality
Is it enough to deactivate RDP to avoid RPD exploits?
RemoteApp .rdp embed creds?Xen virtualized Server 2K8R2 w/ SQL 2K8 becomming unresponsiveConvenient source for information on known exploits (not theoretical)Securing RDP access to Windows Server 2008 R2: is Network Level Authentication enough?Send Ctrl-Alt-Del to nested RDP sessionKB2667402 update fails to install with 0x80004005. Yet it's also showing as installedDeactivate Win XP SP3openVAS - Microsoft RDP Server Private Key Information Disclosure Vulnerability - false Alarm?Windows Rdp stopped workingUnderstanding & Resolving Web Server Exploits
.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty height:90px;width:728px;box-sizing:border-box;
I just got word about the newest known vulnerability of the RDP service. 2 Days ago microsoft made a blog post about it and delivered updates. OS wise even for windows xp.
From what I understand the vulnerability seems to come into effect, before there is any attempt to authentificate the connection / user as authentification does not affect it. The patch microsoft delivered should eliminate the problem.
Still though I'm wondering if it is already enough to "just" deactivate the RDP service to avoid being vulnerable to this kind of vulnerability?
(naturally this does not circumvent having to apply the patch in the end).
windows-server-2008-r2 windows-xp rdp vulnerabilities
add a comment |
I just got word about the newest known vulnerability of the RDP service. 2 Days ago microsoft made a blog post about it and delivered updates. OS wise even for windows xp.
From what I understand the vulnerability seems to come into effect, before there is any attempt to authentificate the connection / user as authentification does not affect it. The patch microsoft delivered should eliminate the problem.
Still though I'm wondering if it is already enough to "just" deactivate the RDP service to avoid being vulnerable to this kind of vulnerability?
(naturally this does not circumvent having to apply the patch in the end).
windows-server-2008-r2 windows-xp rdp vulnerabilities
Yes having no port/service to connect to mitigates the exploit
– Drifter104
May 16 at 9:02
tnx @Drifter104 I was just not sure if its enough or not (the patch page wasn't 100% clear for me nor my collegues).
– Thomas
May 16 at 9:12
add a comment |
I just got word about the newest known vulnerability of the RDP service. 2 Days ago microsoft made a blog post about it and delivered updates. OS wise even for windows xp.
From what I understand the vulnerability seems to come into effect, before there is any attempt to authentificate the connection / user as authentification does not affect it. The patch microsoft delivered should eliminate the problem.
Still though I'm wondering if it is already enough to "just" deactivate the RDP service to avoid being vulnerable to this kind of vulnerability?
(naturally this does not circumvent having to apply the patch in the end).
windows-server-2008-r2 windows-xp rdp vulnerabilities
I just got word about the newest known vulnerability of the RDP service. 2 Days ago microsoft made a blog post about it and delivered updates. OS wise even for windows xp.
From what I understand the vulnerability seems to come into effect, before there is any attempt to authentificate the connection / user as authentification does not affect it. The patch microsoft delivered should eliminate the problem.
Still though I'm wondering if it is already enough to "just" deactivate the RDP service to avoid being vulnerable to this kind of vulnerability?
(naturally this does not circumvent having to apply the patch in the end).
windows-server-2008-r2 windows-xp rdp vulnerabilities
windows-server-2008-r2 windows-xp rdp vulnerabilities
asked May 16 at 8:47
ThomasThomas
1031
1031
Yes having no port/service to connect to mitigates the exploit
– Drifter104
May 16 at 9:02
tnx @Drifter104 I was just not sure if its enough or not (the patch page wasn't 100% clear for me nor my collegues).
– Thomas
May 16 at 9:12
add a comment |
Yes having no port/service to connect to mitigates the exploit
– Drifter104
May 16 at 9:02
tnx @Drifter104 I was just not sure if its enough or not (the patch page wasn't 100% clear for me nor my collegues).
– Thomas
May 16 at 9:12
Yes having no port/service to connect to mitigates the exploit
– Drifter104
May 16 at 9:02
Yes having no port/service to connect to mitigates the exploit
– Drifter104
May 16 at 9:02
tnx @Drifter104 I was just not sure if its enough or not (the patch page wasn't 100% clear for me nor my collegues).
– Thomas
May 16 at 9:12
tnx @Drifter104 I was just not sure if its enough or not (the patch page wasn't 100% clear for me nor my collegues).
– Thomas
May 16 at 9:12
add a comment |
1 Answer
1
active
oldest
votes
The security bulletin for CVE-2019-0708 answers this question: yes, disabling Remote Desktop Services mitigates the issue.
In fact, just turning on Network Level Authentication protects you from unauthenticated attacks. (Whether this is a sufficient mitigation depends on your circumstances.)
add a comment |
Your Answer
StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "2"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);
else
createEditor();
);
function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader:
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
,
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);
);
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f967535%2fis-it-enough-to-deactivate-rdp-to-avoid-rpd-exploits%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
1 Answer
1
active
oldest
votes
1 Answer
1
active
oldest
votes
active
oldest
votes
active
oldest
votes
The security bulletin for CVE-2019-0708 answers this question: yes, disabling Remote Desktop Services mitigates the issue.
In fact, just turning on Network Level Authentication protects you from unauthenticated attacks. (Whether this is a sufficient mitigation depends on your circumstances.)
add a comment |
The security bulletin for CVE-2019-0708 answers this question: yes, disabling Remote Desktop Services mitigates the issue.
In fact, just turning on Network Level Authentication protects you from unauthenticated attacks. (Whether this is a sufficient mitigation depends on your circumstances.)
add a comment |
The security bulletin for CVE-2019-0708 answers this question: yes, disabling Remote Desktop Services mitigates the issue.
In fact, just turning on Network Level Authentication protects you from unauthenticated attacks. (Whether this is a sufficient mitigation depends on your circumstances.)
The security bulletin for CVE-2019-0708 answers this question: yes, disabling Remote Desktop Services mitigates the issue.
In fact, just turning on Network Level Authentication protects you from unauthenticated attacks. (Whether this is a sufficient mitigation depends on your circumstances.)
answered May 17 at 0:47
Harry JohnstonHarry Johnston
4,18012040
4,18012040
add a comment |
add a comment |
Thanks for contributing an answer to Server Fault!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f967535%2fis-it-enough-to-deactivate-rdp-to-avoid-rpd-exploits%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Yes having no port/service to connect to mitigates the exploit
– Drifter104
May 16 at 9:02
tnx @Drifter104 I was just not sure if its enough or not (the patch page wasn't 100% clear for me nor my collegues).
– Thomas
May 16 at 9:12