X

Remote Desktop Protocol (RDP) Vulnerability

Remote Desktop Protocol (RDP) Vulnerability

Robert Vamosi Former Editor
As CNET's former resident security expert, Robert Vamosi has been interviewed on the BBC, CNN, MSNBC, and other outlets to share his knowledge about the latest online threats and to offer advice on personal and corporate security.
Robert Vamosi
Over the weekend, Microsoft issued a concerning the Remote Desktop Protocol (RDP) found in Windows 2000, Windows Server 2003, and Windows XP (both Home and Professional editions). Only computers with RDP services enabled are affected; these include Terminal Services in Windows 2000 and Windows Server 2003 and Remote Desktop Sharing and Remote Desktop Assistance in Windows XP. The reported vulnerability in RDP could lead to a denial of service attack, effectively crashing your computer. There is no patch currently available. Instead, Microsoft recommends using a firewall, specifically to block port 3389, which is used by RDP services, as well as disabling Terminal Services in Windows 2000 and Windows Server 2003 and disabling Remote Desktop in Windows XP Professional. Remote sessions should be carried out using secure Internet Protocol Security (IPSec) or Virtual Private Network (VPN) instead.