Wormable Microsoft RDP flaw appears closer to exploit

Share this article:

The race appears to be on to develop a working exploit for a serious Windows vulnerability patched earlier this week by Microsoft.

The bug in Remote Desktop Protocol (RDP), which allows for the remote connection to other computers, enables an uncredentialed attacker to access and install malicious code on a machine running the tool, if it does not have network-level authentication enabled.

"That's obviously much more serious than a vulnerability which relies upon a user to click on an attachment, or be tricked into running a piece of code," Graham Cluley, senior technology consultant at security firm Sophos, wrote in a blog post on Wednesday.

Microsoft has said it expects a successful exploit to be developed within a month because of "the attractiveness" of the vulnerability to criminals.

Security experts are particularly concerned about the flaw because it affects all Windows versions and could give rise to a worm. Last year, the Morto worm spread, and provided an example of what can happen when there is a weakness in RDP.

So far, however, Microsoft has not seen any public exploit code or active attacks, Yunsun Wee, director of Trustworthy Computing at the software giant, told SCMagazine.com in an email on Thursday. Users are encouraged to apply the patch.

But, according to Russian security firm Positive Technologies, working code already has appeared on a Chinese forum, though the link provided no longer is functional. And according to a report by security blogger Brian Krebs, at least one hacker site is offering a bounty for a successful exploit.

Share this article:

Sign up to our newsletters

More in News

In Cisco probe, misuse or compromise spotted on all firms' networks

In Cisco probe, misuse or compromise spotted on ...

Cisco analyzed the business networks of 30 multinational companies last year, and revealed the findings in its 2014 Annual Security Report.

Fareit trojan observed spreading Necurs, Zbot and CryptoLocker

The Necurs and Zbot trojans, as well as CryptoLocker ransomware, has been observed by researchers as being spread through another trojan, known as Fareit.

Post Heartbleed, tech giants join initiative to bolster open source

Post Heartbleed, tech giants join initiative to bolster ...

The newly formed Core Infrastructure Initiative, created to boost under-funded open source projects, will tackle OpenSSL first.