HOME     MENU     SEARCH     NEWSLETTER    
THE ENTERPRISE SECURITY SUPERSITE. UPDATED 9 MINUTES AGO.
You are here: Home / Windows Security / Fix for Windows RDP Flaw Is Urgent
Neustar, Inc.
Protect your website & network using real-time information & analysis
www.neustar.biz
Patch Tuesday Focus Is on Critical RDP Flaw
Patch Tuesday Focus Is on Critical RDP Flaw
By Jennifer LeClaire / Enterprise Security Today Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
MARCH
14
2012

Microsoft on Tuesday released six comprehensive security updates as part of its regular monthly cycle to help protect its customers from potential cyber-attacks. All security researchers agree that MS12-020 is the key focus.

Microsoft also issued a "Fix-it" this month that lets IT admins enable Network Level Authentication, which mitigates against certain potential exploit vectors. IT admins can use the Fix-it for added protection as they evaluate MS12-020, which is susceptible to pre-authentication exploit on systems running Remote Desktop Protocol without enabling NLA.

"We understand that our customers need time to evaluate and test all bulletins before applying them. To provide for a bit of scheduling flexibility, we're offering a one-click, no-reboot Fix-it that enables Network-Level Authentication, an effective mitigation for this issue," Angela Gunn of Microsoft's Trustworthy Computing group wrote in a blog post. Gunn said the Fix-it applies to Vista, Server 2008, Windows 7 and Server 2008R2 systems.

Exploits Coming Soon

RDP is a popular method for controlling remote Windows machines, however it is not active by default on standard Windows installations, said Wolfgang Kandek, CTO of Qualys. It needs to be configured and started by the system's owner, which then makes the vulnerability accessible.

"Consequently we expect that only a relatively small percentage of machines will have RDP up and running. The vulnerability itself is accessible through the network, does not require authentication and allows code execution on the targeted machine, a highly prized combination by attackers," Kandek said. "Microsoft has rated its exploitability index as 1, meaning that they expect working exploits to be out in fewer than 30 days."

RDP Recommendations

Kandek is making some clear recommendations for the RDP vulnerability. First, within the week apply the patch on Windows machines that are running the Internet-facing RDP service. According to Kandek, IT admins can scan for port 3389 on the perimeter if there is no updated map.

The patch requires a reboot to become active. IT admins that cannot apply the patch or reboot machines, Kandek said, can configure the firewalls on the machines so that only trusted IPs can access port 3389. He also recommended activating the NLA protocol, which does not have this vulnerability.

"Within the month patch the rest of your systems -- both external and internal," Kandek said. "While the main attack vector is directly through the Internet, it is likely that malware will be equipped with the exploit for the RDP vulnerability, and that it will be used for internal malware propagation."

An Unpleasant Flashback

Tyler Reguly, technical manager of security research and development at nCircle, said Tuesday was a flashback of the bad old Patch Tuesdays. Remote, unauthenticated vulnerability attacks are becoming a rarity these days, with end user and client software being the attack vector of choice recently.

"This brings back a scary, old buzzword though, it's 'wormable.' It's a scary word, but MS12-020 makes it completely possible," Reguly said. "This might be the month to throw the patch rulebook out the window and install this patch faster than your enterprise patch cycle normally allows. It's critical that enterprises apply the MS12-020 patch as quickly as possible."

Tell Us What You Think
Comment:

Name:

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY INTEREST YOU
Neustar, Inc. (NYSE: NSR) is a trusted, neutral provider of real-time information and analysis to the Internet, telecommunications, information services, financial services, retail, media and advertising sectors. Neustar applies its advanced, secure technologies in location, identification, and evaluation to help its customers promote and protect their businesses. More information is available at www.neustar.biz.
MORE IN WINDOWS SECURITY
Product Information and Resources for Technology You Can Use To Boost Your Business

NETWORK SECURITY SPOTLIGHT
The FBI is pointing the finger of blame for the Sony Pictures cyberattack directly at North Korea. The hackers stole confidential data and caused the movie giant to can its new comic film, "The Interview."

ENTERPRISE HARDWARE SPOTLIGHT
Remember the classic BlackBerry that took the cell phone market by storm in its heyday? Well, it’s retro time at the Canadian handset maker as it rolls out the aptly-named BlackBerry Classic.

© Copyright 2014 NewsFactor Network, Inc. All rights reserved. Member of Accuserve Ad Network.