5 Steps to Remove A Remote Desktop Vulnerability From OT Endpoints
Tackling cyber security risk in the form of remote desktop vulnerability in five easy steps.
Learn MoreSubscribe to stay in the loop with the latest OT cyber security best practices.
In May 2019, BlueKeep emerged as a new remote desktop vulnerability with mitigations. Recent security patch news coverage has been focused on a flaw in Windows 10 and Windows Server vulnerabilities that could be used to spoof a certificate for secure Web sessions or signing code.
Among the fixes for the CryptoAPI vulnerability, there were 48 other vulnerabilities that were patched in the latest update package. Five were related to Microsoft’s Remote Desktop Protocol (RDP)-based service, which is used by thousands of organizations for remote access to computers within their networks. Two of them are flaws in the Windows Remote Desktop Gateway allowing attackers to gain access to networks without a login requirement.
The bugs identified as CVE-2020-0609 and CVE-2020-0610 are rated as more dangerous than the CryptoAPI vulnerability because of their ability to be used remotely to execute code, install programs, modify or delete data, and create full-access user accounts on targeted RDP servers before the gateway attempts to authenticate them. Fortunately, no exploit code or proof of concept are reported to be seen today. There is no workaround for the vulnerability without applying a software patching update. Both cyberattacks rely on specially crafted requests to the Remote Desktop Gateway using the RDP protocol.
If any of these approached seem daunting and difficult to achieve in-house, find a cybersecurity partner with extensive OT experience in the deployment and tuning of best-in-class security solutions while integrating all aspects into your cybersecurity program to make it easy and affordable to operationalize.
Tackling cyber security risk in the form of remote desktop vulnerability in five easy steps.
Learn MoreGain OT security maturity with remote work and limited physical plant access. Learn how to rapidly enable remote security deployment and management in ICS.
Learn MoreA programmatic industrial cyber security approach ensures the tools and procedures applied in the time of crisis are foundational for a long-term solution.
Learn More