First published: Tue Nov 11 2014(Updated: )
The audit logon feature in Remote Desktop Protocol (RDP) in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly log unauthorized login attempts supplying valid credentials, which makes it easier for remote attackers to bypass intended access restrictions via a series of attempts, aka "Remote Desktop Protocol (RDP) Failure to Audit Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.0 | ||
Microsoft Windows | ||
Microsoft Windows RT | ||
Microsoft Windows RT | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Vista | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-6318 is classified as a moderate severity vulnerability.
To fix CVE-2014-6318, ensure that all relevant Microsoft security updates are applied to affected systems.
CVE-2014-6318 affects Microsoft Windows Vista SP2, Windows 7 SP1, Windows 8, Windows 8.1, and multiple versions of Windows Server.
CVE-2014-6318 is related to improper logging of unauthorized login attempts via the Remote Desktop Protocol (RDP).
Yes, CVE-2014-6318 can potentially allow an attacker to attempt unauthorized access without being properly logged.