Jump to content
  • Sign Up
×
×
  • Create New...

Microsoft has no plans to fix Windows RDP bug that lets you log in with old passwords


Recommended Posts

  • Diamond Member

This is the hidden content, please

This is the hidden content, please
has no plans to fix Windows RDP bug that lets you log in with old passwords

JZvJygAtspRssigs7xdxK6.png

This is the hidden content, please
apparently has no plans to fix a security flaw that leaves machines vulnerable using Windows Remote Desktop Protocol (RDP). In a recent report submitted to the
This is the hidden content, please
Security Response Center by Daniel Wade, the current configuration of Windows RDP will allow users to access machines to using old, cached passwords even if they have been updated or changed.

This makes it impossible to prevent access to machines using RDP by changing the password. Old cached passwords will still allow a successful login which is a huge security concern. Despite the glaring open *********,

This is the hidden content, please
has insisted that this is intentional and the company has no plans to change the way this function operates as it provides a method for users to never be completely locked out of their machine.

This is the hidden content, please
has their own definition of what qualifies as a “security vulnerability” and claims that this does not count as a vulnerability. The feature was intentionally designed to make sure users could access a given machine through RDP even after it’s been offline for a long ******* of time. Despite the concern, the feature is not optional and cannot be disabled.

Wade described the security concern has a breakdown of trust. When it comes to information security, changing a password is generally perceived as a surefire way to terminate access to a given account when they’re authenticated using any previous password. In this case, you can’t prevent access using old passwords and receive no warning that the old passwords are still valid when using RDP.

This is especially concerning in situations where passwords have been publicly compromised. Because there’s no way to eliminate the RDP authorization with them, would be hackers can technically gain access to the machine with the account owner being none the wiser.

This is the hidden content, please
has been aware of the issue for some time, citing a previous report from August of 2023. Although the issue was investigated back then, the decision was ultimately made to not to change the way it functions out of concern for compatibility issues it could face with existing applications.

Follow

This is the hidden content, please
to get our up-to-date news, analysis, and reviews in your feeds. Make sure to click the Follow button.

Get Tom’s Hardware’s best news and in-depth reviews, straight to your inbox.



This is the hidden content, please

#

This is the hidden content, please
#plans #fix #Windows #RDP #bug #lets #log #passwords

This is the hidden content, please

This is the hidden content, please

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Unfortunately, your content contains terms that we do not allow. Please edit your content to remove the highlighted words below.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Vote for the server

    To vote for this server you must login.

    Jim Carrey Flirting GIF

  • Recently Browsing   0 members

    • No registered users viewing this page.

Important Information

Privacy Notice: We utilize cookies to optimize your browsing experience and analyze website traffic. By consenting, you acknowledge and agree to our Cookie Policy, ensuring your privacy preferences are respected.