The CredSSP vulnerability in the RDP protocol affects all versions of Windows
A serious vulnerability has just been found on the Credential Security Support Provider (CredSSP) protocol that affects all Windows versions, allowing attackers to exploit RDP and WinRM to steal data or run malicious code.
CredSSP protocol is used by RDP (Remote Desktop Protocol) and WinRM (Windows Remote Management), is responsible for forwarding encrypted authentication information from Windows client to server for remote authentication.
Discovered by researchers at Preempt Secutiry, this vulnerability (CVE-2018-0886) is a logical error in CredSSP, which allows an intermediary to use WiFi or physically connect to the network to steal authentic data and Attack Remote Procedure Call.
'The data theft attacker from the user can run the command with admin rights. This is especially important when controlling domain names, when most Remote Procedure Call (RPC / DCE) are turned on automatically, 'said Yaron Zinar, a researcher in Preempt.
Because RDP is the most popular application for remote login and most business customers use RDP, most networks are at risk because of this error.
The problem was reported to Microsoft by Preempt last August, but it was not until Patch Tuesday that it lasted nearly seven months - they patched the vulnerability.
Researchers also warn that patching alone is not enough to prevent attacks, IT professionals should change some of the necessary configurations. Blocking related application ports including RDP or DCE / RPC also helps to reduce but this type of attack can be done in many ways with other protocols.
Therefore, above all, it is advisable to limit the use of the highest possible account. March Patch Patch also patched other software such as Microsoft IE, Edge, Windows OS, Office, PowerShell, Core ChakraCore and Adobe Flash.
See more:
- Top 12 most dangerous backdoor in computer history
- Secure Terminal Services of Windows Server 2008
- Access Windows Remote Desktop via Internet
You should read it
- Deploy multi-factor authentication to remote Microsoft Teams users
- Remote management on Windows Server 2012 with Remote Management Service
- Top 15 free remote computer control tools
- Overcoming Microsoft's multi-layer authentication tool, you will receive up to $ 100,000
- Microsoft expert discovered a series of serious code execution errors in IoT, OT devices
- Top 5 most dangerous remote execution vulnerabilities in early 2020, some even automatically infect other computers without users knowing.
- How to control a remote computer with AnyDesk Remote
- What is the RADIUS protocol?
May be interested
- Detects a vulnerability that threatens all Windows computers shipped from 2012 up to nowsecurity researchers have found a vulnerability in the microsoft windows platform binary table (wpbt). this vulnerability can be exploited by hackers to install rootkits on all windows computers shipped from 2012 to the present.
- Warning: This simple command can damage your Windows computer's driverecently, security developers discovered a zero-day vulnerability in windows 10 that allowed hackers to damage users' ntfs hard drives with just one command. this vulnerability even affects windows xp.
- New privilege escalation vulnerability called 'Dirty Pipe' is threatening all Linux distrosrecently, security researcher max kellermann shared about a security flaw called 'dirty pipe'. it affects linux kernel 5.8 and above and even android devices.
- Steps to fix PrintNightmare vulnerability on Windows 10if you've been following recent windows security news, you may have heard of printnightmare. this is a vulnerability that allows hackers to exploit your system and run malicious code on it.
- Google discovered a dangerous zero day vulnerability on many Samsung Galaxy, Huawei, Xiaomi and even Pixel phonesthis vulnerability affects many major phone companies including huawei p20, pixel 1 and pixel 2, xiaomi, samsung with galaxy s7, s8 and s9 ... and most likely exploited by hackers.
- Wi-Fi Vulnerability Leads to FragAttacks Attacksattackers have exploited the wifi vulnerability to perform data theft and spread malicious code that affects the device.
- Detecting zero-day vulnerability in the Dropbox 10 Windows app, users pay attention!a group of free security researchers recently announced the zero-day vulnerability in the dropbox version of the windows app.
- New series of Bluetooth vulnerabilities discovered that could put millions of Windows and Android devices worldwide in troublehackers can easily take advantage of existing vulnerabilities in the bluetooth protocol to deploy many different violating activities.
- Critical vulnerabilities discovered in Framework Electron, Skype, Slack, Twitch and a series of affected appsthe framework of a variety of popular desktop applications such as skype, slack, signal, twitch ... appears a serious security hole. it is important that this vulnerability only affects windows.
- New malware targets Windows 64-bitaccording to kaspersky lab, rootkit writers have begun exploiting a vulnerability to bypass patchguard protection built into 64-bit versions of windows.