Reply to post: Yet another RDP attack surfaces?

Firefox fires blockers at trackers, Exim tackles command exec flaw, and RDP pops up yet again

Anonymous Coward

Yet another RDP attack surfaces?

we have determined that this behavior does not meet the Microsoft Security Servicing Criteria for Windows .. As long as it is connected, the client will cache the credentials used for connecting and reuse them when it needs to auto-reconnect (so it can bypass NLA)."’ except it'll bypass the lock screen on remote sessions.

a. See locked RDP session.

b. Pull ethernet cable.

c. Reconect ethernet cable.

d. Get full access to session.

e. Not a security vulnerability.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Biting the hand that feeds IT © 1998–2022