Dear madams and sirs,
a new vulnerability from the category Microsoft Windows RDP had been reported in the media (LINK) and had been rated by All for One Group Securityteam.
Based on Microsoft’s assessment
„… A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems Remote Desktop Service via RDP…” and the CVSS rating to 9.8/10 (Critical) we came to the conclusion, that short time action is required. Customer specific ratings should be discussed individually.
Recommendation for action: Our customers should keep already agreed maintenance windows and agree to All for One's urgent patch requests.
Customer specific requirements will be processed by tickets with our support(+49 711 788 07 600 - firstname.lastname@example.org - ).
All for One Group AG