Patchday Microsoft

Windows vulnerable to worm-like attacks

Dear madams and sirs,

a new vulnerability from the category Microsoft Windows RDP had been reported in the media (LINK) and had been rated by All for One Group Securityteam.

Based on Microsoft’s assessment

„… A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems Remote Desktop Service via RDP…” and the CVSS rating to 9.8/10 (Critical) we came to the conclusion, that short time action is required. Customer specific ratings should be discussed individually.

Recommendation for action: Our customers should keep already agreed maintenance windows and agree to All for One's urgent patch requests.

Customer specific requirements will be processed by tickets with our support(+49 711 788 07 600 - - ).

Best regards
All for One Group AG