• SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us

Call us today! 844-OCD-TECH

Find our Location
OCD TechOCD Tech
  • SecurePath for Auto Dealers
  • Services
    • SOC Reporting Services
      • SOC 2® Readiness Assessment
      • SOC 2® Reports
      • SOC 3® Reports
      • SOC for Cybersecurity® Reports
    • IT Advisory Services
      • IT Vulnerability Assessment
      • Network Penetration Testing
      • Privileged Access Management
      • Social Engineering Testing
      • Virtual CISO (vCISO)
      • Written Information Security Program (“WISP”)
      • IT General Controls Audit & Compliance
    • IT Government Compliance
      • CMMC Cybersecurity Services & Compliance
      • DFARS Compliance
      • FTC Safeguards Compliance
  • Industries
    • Financial Services
    • Government
    • Auto Dealerships
    • Enterprise
  • Blog
  • About Us
    • Meet The Team
    • Jobs
  • Contact Us
RDPeek-A-Boo

RDPeek-A-Boo

May 16, 2019 Posted by Scott Goodwin IT Security

Critical Remote Desktop Flaw Identified in Microsoft Windows Operating Systems

A newly discovered vulnerability in the Microsoft Remote Desktop Protocol has been announced, along with a corresponding patch for Windows XP, 7, 2003, 2008, and 2008 R2. Successful exploitation of this vulnerability is possible via a remote unauthenticated attacker, with no user interaction. This represents the most severe class of vulnerabilities, in that an attacker can execute code (i.e. malware) on a system with elevated privileges, simply by sending crafted RDP packets to a vulnerable system.

The security industry is drawing many corollaries between this newly identified vulnerability, and the MS17-010 (ETERNALBLUE) vulnerability that allowed the global spread of the WannaCry ransomware several years ago. Similar to WannaCry, this vulnerability is “wormable”, meaning once compromised, the target system can be used to identify additional vulnerable systems and exploit them automatically. For example, one vulnerable RDP server exposed directly to the internet can lead to complete compromise of the internal network. Once the internet-facing system is compromised, it may become a pivot-point into the internal network, where many RDP services are available for exploitation.

In fact, this vulnerability may even be more severe than the MS17-010 vulnerability exploited to spread WannaCry. MS17-010 relied on a vulnerability in the Server Message Block protocol (port 445), which is sometimes, but not often, exposed directly to the internet. The newly identified vulnerability, however, exists in the Remote Desktop Protocol (port 3389), which sees much more widespread use on the internet. Organizations will often expose certain internal systems to the internet via RDP to allow remote access, as this is the purpose of RDP. Since a significantly higher number of systems expose RDP to the internet as compared to SMB, this vulnerability poses a significantly higher risk.

While there are no known reports of this vulnerability being exploited in the wild, Microsoft has released a set of patches to address this potential risk. Microsoft has even taken the very rare position of releasing patches for legacy operating systems, such as Windows XP, which demonstrates the level of risk Microsoft has associated with this vulnerability. Between the time Microsoft releases the patch, and the time that organizations take to test and implement the patch, numerous threat actors will be attempting to reverse engineer the patch in order to identify the exact vulnerability. Once the vulnerability is understood, these threat actors will build a weaponized exploit, and use this vulnerability to spread ransomware, cryptocoin miners, or gain a foothold in target organizations.

OCD Tech is anticipating widespread attacks targeting this vulnerability on a global scale, akin to what occurred once the WannaCry virus really hit its stride, within the next several weeks. If attackers choose to leverage the “wormable” aspect of this vulnerability, the scale of the attack could be truly unprecedented.

OCD Tech recommends the following mitigations:

  1. Ensure that no RDP services are directly exposed to the internet. RDP services which are required remotely should first leverage a VPN connection or other tunnel to protect internal systems from direct remote compromise.
  2. Enable Network Level Authentication (NLA) via GPO for all RDP services. Systems with NLA enabled are protected against ‘wormable’ RDP malware, as NLA requires authentication before the vulnerability can be triggered. However, even with NLA systems are still vulnerable to Remote Code Execution (RCE)  exploitation if the attacker has leaked or stolen credentials.
  3. Apply the Microsoft provided patches as soon as possible, starting with systems which host critical services or sensitive data.
  4. If patches cannot be applied in a timely manner, disable RDP services entirely on vulnerable systems until the patch can be applied, especially on critical systems.
Share
1
Scott Goodwin

About Scott Goodwin

Scott manages the Information Security Advisory Services practice within OCD Tech. Prior to joining the firm, he graduated from the University of Massachusetts Boston with a degree in Physics. Scott’s primary engagements include security advisory services, and security assessments against industry standard frameworks including NIST 800-53 and the NIST Cybersecurity Framework, as well as NIST 800-171 assessments for multiple clients in the defense and aerospace sector. Currently, Scott oversees many technical engagements, including vulnerability assessments, and is a lead penetration tester for OCD Tech.  Scott is directly responsible for the identification of three (3) previously unknown vendor software vulnerabilities which have been registered with Mitre’s Common Vulnerabilities and Exposures (CVE) database as CVE-2018-11628, 2019-7004, and 2019-19774.  Scott is also the key developer on the OCD Tech open source discovery platform, Scrapy. The platform identifies public domain information and provides reporting and alerting for OCD Tech clients upon discovery of key sensitive company/personal information.

You also might be interested in

Don’t Fall Victim To A W-2 Phishing Scam
Phishing Scam, Computer Keyboard with a yellow blank sticky note with text Phishing Scam

Don’t Fall Victim To A W-2 Phishing Scam

May 29, 2018

Businesses have been victimized by W-2 phishing scams in growing[...]

OCDTECH.SEC CYBERSECURITY

SEC Cybersecurity rules

Aug 23, 2023

On August 4, 2023, the SEC’s cybersecurity disclosure rules were[...]

OCD TECH. Boston's Role in Cybersecurity Innovation

Boston’s Role in Cybersecurity Innovation

Nov 10, 2023

Innovation is not an option—it’s a necessity. In this landscape,[...]

Find us on

Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Send Message
OCD Tech logo Audit. Security. Assurance.

IT Audit | Cybersecurity | IT Assurance | IT Security Consultants – OCD Tech is a technology consulting firm serving the IT security and consulting needs of businesses in Boston (MA), Braintree (MA) and across New England. We primarily serve Fortune 500 companies including auto dealers, financial institutions, higher education, government contractors, and not-for-profit organizations with SOC 2 reporting, CMMC readiness, IT Security Audits, Penetration Testing and Vulnerability Assessments. We also provide dark web monitoring, DFARS compliance, and IT general controls review.

Contact Info

  • OCD Tech
  • 25 BHOP, Suite 407, Braintree MA, 02184
  • 844-623-8324
  • https://ocd-tech.com

Follow Us

Videos

Check Out the Latest Videos From OCD Tech!

Services

SOC Reporting Services
– SOC 2 ® Readiness Assessment
– SOC 2 ®
– SOC 3 ®
– SOC for Cybersecurity ®

IT Advisory Services
– IT Vulnerability Assessment
– Penetration Testing
– Privileged Access Management
– Social Engineering
– WISP
– General IT Controls Review

IT Government Compliance Services
– CMMC
– DFARS Compliance
– FTC Safeguards vCISO

Industries

  • Financial Services
  • Government
  • Enterprise
  • Auto Dealerships

© 2025 — OCD Tech: IT Audit - Cybersecurity - IT Assurance

  • OCD Tech
  • About Us
  • Contact Us
Prev Next