{"id":5308,"date":"2018-03-29T00:33:00","date_gmt":"2018-03-28T22:33:00","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=5308"},"modified":"2019-11-21T11:19:18","modified_gmt":"2019-11-21T10:19:18","slug":"microsoft-will-block-rdp-connections-from-clients-soon","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2018\/03\/29\/microsoft-will-block-rdp-connections-from-clients-soon\/","title":{"rendered":"Microsoft will block RDP connections from clients soon"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"http:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2013\/03\/winb.jpg\" width=\"58\" height=\"58\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2018\/03\/29\/microsoft-blockt-bald-rdp-anfragen-in-clients\/\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]Due to a critical vulnerability in Microsoft's Credential Security Support Provider (CredSSP), the company plans to block RDP connections from unpatched clients to Windows Servers in the future. Administrators need to update all clients and servers, to avoid this situation.<\/p>\n<p><!--more--><\/p>\n<h2>What is it about?<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/ssl-vg03.met.vgwort.de\/na\/b098c7165b324ca88df64e535578e9f4\" alt=\"\" width=\"1\" height=\"1\" \/>All versions of Windows have a critical vulnerability in the Credential Security Support Provider (CredSSP). The critical vulnerability lies in the Credential Security Support Provider Protocol (CredSSP), which is used in all previous versions of Windows. The CredSSP protocol was developed for use by RDP (Remote Desktop Protocol) and Windows Remote Management (WinRM). The protocol securely forwards the credentials encrypted by the Windows client to the target servers for remote authentication.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"CredSS-Angriff\" src=\"https:\/\/web.archive.org\/web\/20180908201327if_\/https:\/\/blog.preempt.com\/hs-fs\/hubfs\/Figure1-AttackScenario.png?t=1520969878217&#038;width=639&#038;height=199&#038;name=Figure1-AttackScenario.png\" alt=\"CredSS-Angriff\" width=\"623\" height=\"194\" \/><br \/>\n(<a href=\"https:\/\/web.archive.org\/web\/20180711170927\/https:\/\/blog.preempt.com\/security-advisory-credssp\" target=\"_blank\" rel=\"noopener noreferrer\">Source<\/a>)<\/p>\n<p>Vulnerability <a href=\"https:\/\/web.archive.org\/web\/20190121144307\/https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-0886\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2018-0886<\/a> allows remote attackers to use RDP and WinRM connections to steal data or run malware. I recently mentioned this topic in the German blog post <a href=\"https:\/\/www.borncity.com\/blog\/2018\/03\/15\/credssp-sicherheitslcke-in-rdp-unter-windows\/\" target=\"_blank\" rel=\"noopener noreferrer\">CredSSP-Sicherheitsl\u00fccke in RDP unter Windows<\/a>.<\/p>\n<p>The vulnerability was reported to the MSRC in August 2017. Microsoft has closed this vulnerability (CVE-2018-0886) in the CredSSP implementation with the March 2018 update (see also <a href=\"https:\/\/borncity.com\/win\/2018\/03\/19\/patchday-more-microsoft-updates-march-13-2018\/\">Patchday: More Microsoft Updates (March 13, 2018)<\/a>).<\/p>\n<h2>Microsoft's recommendations<\/h2>\n<p>Microsoft's kb article <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4093492\/credssp-updates-for-cve-2018-0886-march-13-2018\" target=\"_blank\" rel=\"noopener noreferrer\">4093492<\/a> about the vulnerability within the Credential Security Support Provider Protocol (CredSSP) not only explains the vulnerability. Microsoft also strongly recommends that administrators install the update on servers and clients throughout. Furthermore, the Group Policies must be adapted so that the \"Force Updates Clients\" and \"Mitigated\" settings are activated as soon as possible, both on the server and on the clients. This should protect the servers against insecure (unpatched) clients.<\/p>\n<h2>Unpatched clients connections will be blocked<\/h2>\n<p>According to The Register (<a href=\"http:\/\/www.theregister.co.uk\/2018\/03\/23\/microsoft_rdp_patch_credential_security_support_provider_protocol\/\" target=\"_blank\" rel=\"noopener noreferrer\">see this article<\/a>), Microsoft will block Windows Server RDP clients, that hasn't been patched against the vulnerability, will be blocked (can't be authenticated by the servers). This is to prevent attackers from abusing RDP connections to take over systems and move laterally within a network. Microsoft also explains in detail in KB article <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4093492\/credssp-updates-for-cve-2018-0886-march-13-2018\" target=\"_blank\" rel=\"noopener noreferrer\">4093492<\/a> how they will prevent the vulnerability from being exploited with updates.<\/p>\n<h2>March 13, 2018<\/h2>\n<p>The initial March 13, 2018, release updates the CredSSP authentication protocol and the Remote Desktop clients for all affected platforms. Mitigation consists of installing the update on all eligible client and server operating systems and then using included Group Policy settings or registry-based equivalents to manage the setting options on the client and server computers. We recommend that administrators apply the policy and set it to\u00a0 \"Force updated clients\" or \"Mitigated\" on client and server computers as soon as possible.\u00a0 These changes will require a reboot of the affected systems.<\/p>\n<p>Pay close attention to Group Policy or registry settings pairs that result in \"Blocked\" interactions between clients and servers in the compatibility table later in this article.<\/p>\n<h3>April 17, 2018 (tentative)<\/h3>\n<p>The Remote Desktop Client (RDP) update will enhance the error message that is presented when an updated client fails to connect to a server that has not been updated.<\/p>\n<h3>May 8, 2018 (tentative)<\/h3>\n<p>An update to change the default setting from <em><strong>Vulnerable <\/strong><\/em>to <em><strong>Mitigated<\/strong><\/em>. During the Black Hat Asia conference, The Register learned that this May patch will cause unpatched RDP clients to be rejected by patched Windows servers. This prevents the vulnerability from being exploited.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Due to a critical vulnerability in Microsoft's Credential Security Support Provider (CredSSP), the company plans to block RDP connections from unpatched clients to Windows Servers in the future. Administrators need to update all clients and servers, to avoid this situation.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,22,2],"tags":[69,194],"class_list":["post-5308","post","type-post","status-publish","format-standard","hentry","category-security","category-update","category-windows","tag-security","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/5308","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=5308"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/5308\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=5308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=5308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=5308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}