Summary
*** Vulnerable RDP servers should be patched IMMEDIATELY even where there is a potential business impact (unscheduled maintenance). Notify security@berkeley.edu if you anticipate any delays in patching. ***
Impact
Vulnerable
- Microsoft Windows Server 2008 R2 for x64-based Systems SP1
- Microsoft Windows Server 2008 R2 for Itanium-based Systems SP1
- Microsoft Windows Server 2008 for x64-based Systems SP2
- Microsoft Windows Server 2008 for Itanium-based Systems SP2
- Microsoft Windows Server 2008 for 32-bit Systems SP2
- Microsoft Windows 7 for x64-based Systems SP1
- Microsoft Windows 7 for 32-bit Systems SP1
- Microsoft Windows Server 2003 SP2 x86
- Microsoft Windows Server 2003 x64 Edition SP2
- Microsoft Windows XP SP3 x86
- Microsoft Windows XP Professional x64 Edition SP2
- Microsoft Windows XP Embedded SP3 x86
Recommendations
-
Patch vulnerable systems IMMEDIATELY.
-
Patching priority should first focus on Internet-facing RDP servers, then Campus network-facing RDP servers, and finally any other RDP servers that are internal or restricted to trusted IP addresses. All vulnerable RDP servers should be patched without delay.
-
Notify security@berkeley.edu if you anticipate any delays in patching.
-
There are no known workarounds for this vulnerability. RDP servers with Network Level Authentication (NLA) enabled can mitigate wormable malware, but are still vulnerable if valid credentials are used.