First published: Tue Oct 01 2002(Updated: )
Remote Data Protocol (RDP) version 5.0 in Microsoft Windows 2000 and RDP 5.1 in Windows XP does not encrypt the checksums of plaintext session data, which could allow a remote attacker to determine the contents of encrypted sessions via sniffing, aka "Weak Encryption in RDP Protocol."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server | =beta3 | |
Microsoft Windows Terminal Services using RDP | =sp1 | |
Microsoft Windows XP | =sp1 | |
Microsoft Windows XP | =gold | |
Microsoft Windows 2000 | ||
Microsoft Windows NT | =4.0-sp6 | |
Microsoft Windows XP | ||
Microsoft Windows 2000 | =sp2 | |
Microsoft Windows NT | =4.0-sp4 | |
Microsoft Windows Terminal Services using RDP | =sp3 | |
Microsoft Windows NT | =4.0 | |
Microsoft Windows NT | =4.0-sp6a | |
Microsoft Windows NT | =4.0-sp1 | |
Microsoft Windows 2000 | =sp1 | |
Microsoft Windows XP | ||
Microsoft Windows NT | =4.0-sp2 | |
Microsoft Windows NT | =4.0-sp5 | |
Microsoft Windows XP | =sp1 | |
Microsoft Windows Terminal Services using RDP | ||
Microsoft Windows NT | =4.0-sp3 | |
Microsoft Windows Terminal Services using RDP | =sp2 | |
Microsoft Windows 2000 | =sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0863 is considered a high-severity vulnerability due to the risk of remote attackers gaining unauthorized access to session data.
To mitigate CVE-2002-0863, apply the latest service packs and updates for Windows 2000 and Windows XP that address the weak encryption issue.
CVE-2002-0863 impacts Microsoft Windows 2000, Windows XP, and specific versions of Windows NT using RDP.
CVE-2002-0863 allows attackers to sniff unencrypted session data, potentially exposing sensitive information.
Although CVE-2002-0863 primarily affects older systems, any legacy systems still in use could be vulnerable to exploitation.