Microsoft Remote Desktop Protocol Memory Corruption Vulnerability
Microsoft Remote Desktop Protocol (RDP) in Windows XP, Vista, Server 2003, 2008, and Windows 7/Server 2008 R2 systems contains a memory corruption vulnerability (CWE-94) that can be triggered remotely without authentication. An attacker sending malformed RDP packets to port 3389 could cause memory corruption and potentially execute arbitrary code. No vendor patches are available for Windows XP, Vista, Server 2003, or Server 2008 systems as these platforms are end-of-life. Windows 7 and Server 2008 R2 systems may have patches available (KB2621440, KB2667402) depending on configuration.
- Network access to RDP port (TCP 3389)
- No authentication required
- RDP service must be running on the target system
Patching may require device reboot — plan for process interruption
/api/v1/advisories/0d588e27-8d5a-4901-80f6-d2c0abc557faGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.