First published: Wed Jun 11 2014(Updated: )
The Remote Desktop Protocol (RDP) implementation in Microsoft Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 does not properly encrypt sessions, which makes it easier for man-in-the-middle attackers to obtain sensitive information by sniffing the network or modify session content by sending crafted RDP packets, aka "RDP MAC Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.0 | ||
Microsoft Windows | ||
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0296 is considered a critical vulnerability due to the potential for sensitive information disclosure and unauthorized session modifications.
CVE-2014-0296 affects RDP sessions by failing to properly encrypt data, allowing man-in-the-middle attackers to intercept sensitive information.
CVE-2014-0296 affects Microsoft Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 both Gold and R2.
To fix CVE-2014-0296, apply the most recent security updates provided by Microsoft for the affected operating systems.
While there is no official workaround for CVE-2014-0296, disabling RDP or using a VPN can help mitigate risks until the patch is applied.