Skip to main content
Tag

remote desktop protocol

||

Why RDP Vulnerabilities Need Your Attention

By Blog

Why RDP Vulnerabilities Need Your Attention

With a history of security holes, Remote Desktop Protocol (RDP) is being used more than ever by remote users. How can IT departments manage the risks?

Remote Work Has Changed the IT Landscape

As more employees are forced to work from home due to COVID-19, there is a heightened need for tools and checks to ensure remote devices are properly secured.

The current situation has certainly rocked the foundation for how businesses function and how IT departments are able to respond. Not only are there endpoints and servers left on-premise that may be sitting idle, waiting for an attacker to come along, but sending massive fleets home to unknown territory and networks opens up a whole new can of worms.

How RDP Puts You at Risk

One vulnerability that has been plaguing the industry for over a decade, Remote Desktop Protocol (RDP) is being used more than ever to allow remote workers back into the corporate network.

In late March 2020, after most non-essential businesses were forced to send workers home, search engine Shodan reported a 41.5% spike in “the number of devices exposing RDP to the internet via RDP’s default TCP port 3389.”

This protocol has seen its fair share of security holes and hardship since the beginning. Most notably, 2019 gave rise to a vulnerability known as BlueKeep that could allow attackers to remotely take control of an unpatched connected device. Further, attackers continually rely on brute force attacks to attempt to obtain credentials that have remote desktop access.

If successful, the attackers can gain access to remote workstations and servers that the accounts are authorized for. Organizations need to adopt adequate security measures to proactively protect themselves when using RDP, as well as other potential attack vectors.

Preventing RDP Exploits and Vulnerabilities

How can IT departments accurately check to make sure RDP is checked, as well as other potential security holes? The answer is simple: use a vulnerability scanner.

RDP is just one piece of the puzzle—a popular one, no doubt, but there are other flaws to look out for. Backdoors, crypto mining, peer-to-peer applications, open ports, SNMP, and even the configured Windows policies. All must be checked routinely for potential misconfiguration or susceptibility. Now that employees are working from the couch with a corporate device, or even their own, the need for heightened security has never been greater.

Use Syxsense to Manage and Secure Your Environment

Syxsense Secure offers a thorough definitions library so that devices on or off-premise can be securely checked for any of these popular vulnerabilities. Contrary to most conventional vulnerability scanners that must be stood-up on-premise with new or existing hardware, licensing, and corporate firewall rules.

Additionally, Syxsense Secure includes Syxsense Manage, where patch management comes standard. Conventional tools fall short due to the lack of any remediation capabilities as well as rudimentary patch definitions. Once devices are checked, exportable reports can easily be emailed on set schedules so that newly-discovered vulnerabilities can easily be identified and sent to the proper parties, whether in-house or third-party.

Experience the Power of Syxsense

Syxsense has created innovative and intuitive technology that sees and knows everything. Manage and secure your environment with a simple and powerful solution.

Syxsense demo

Schedule Your Syxsense Demo

Syxsense combines IT management, patch management, and security vulnerability scanning in one powerful solution. Get started today.

Schedule My Demo
||

FBI Alert: RDP Exploited

By News

Hope you don’t rely on RDP

The FBI and Department of Homeland Security have released a new US-CERT Alert. Alert I-092718-PSA details the ramping up of cyber attacks exploiting the Remote Desktop Protocol.

RDP is included with Windows, and with millions utilizing that operating system, the vulnerability is widespread.

The alert states “The use of RDP creates risk. Because RDP has the ability to remotely control a system entirely, usage should be closely regulated, monitored, and controlled.” If you don’t use the service, the FBI and DHS recommend you disable it and block any corresponding ports.” It’s also important to regularly monitor your remote access activity.

Why Syxsense is a secure solution to replace RDP

  • Reports can be scheduled to regularly keep you up to date on remote access activity.
  • Syxsense comes with Two-Factor Authentication, ensuring only authorized users can use the solution. This is a feature the FBI recommends for remote access products.
  • The suite comes with other tools, such as our Patch Manager. This, too, is recommended in the alert; “Apply system and software updates regularly.”
  • Communication is 2048-bit Encrypted.
  • End user access controls.
  • No Forced open ports.

RDP is quickly becoming an attacker’s favorite way to access an IT environment. Secure your devices and replace RDP with a secure Remote Control solution. Syxsense has reliable Remote Control as well as many other useful features.

It’s time to ditch RDP. Start a free trial of Syxsense.

Syxsense demo

Schedule Your Syxsense Demo

Syxsense combines IT management, patch management, and security vulnerability scanning in one powerful solution. Get started today.

Schedule My Demo
||||||

RDP Flaw: Every Windows Version Affected

By News

CredSSP Flaw in RDP

Credential Security Support Provider protocol (CredSSP), a Windows protocol that interacts with features like RDP, has a critical vulnerability. The danger here is that malicious entities could manipulate RDP to gain access to user’s devices and environments, stealing sensitive and valuable data.

This previously unknown remote code execution vulnerability was reported to Microsoft in August last year, but the tech giant issued a fix for the protocol just now as part of its Patch Tuesday release—that’s almost after 7 months of reporting.

Since RDP is a feature within Windows, and one of the most popular application to perform remote access, everyone is exposed to this security threat. Literally every version of Windows, at the time of this article, contains this flaw.

Microsoft has released updates that target this issue. Even if you aren’t using RDP regularly, deploying this patch to your windows devices is critical. Because researchers believe this exploit may evolve into new ways to attack your environment, it’s also important to track the activity of remote login sessions.

Syxsense provides both predictive patch management and detailed security reports.

Protect your devices from this major RDP flaw by starting a free trial with Syxsense.

Syxsense demo

Schedule Your Syxsense Demo

Syxsense combines IT management, patch management, and security vulnerability scanning in one powerful solution. Get started today.

Schedule My Demo
|||||||

RDP: Is the ‘R’ for ‘Ransomware’?

By News
[vc_single_image image=”13202″ img_size=”full”]

RDP Creates Vulnerabilities

Remote Desktop Protocol is something you’ll find on every Windows computer and widely used throughout the IT industry. But does the ‘R’ in RDP now stand for Ransomware?

As the common methods of distributing ransomware get tougher, attackers are looking for new exploits. The manipulation of RDP is coming to the forefront. Since almost every Windows computer has it, and it’s built to access devices, it may become the ideal way for ransomware to enter an environment.

Some high-profile ransomware already utilize this method, such as BitPaymer.

So, how do you protect your business from this vulnerability?

Step 1: Disable, and then replace, RDP.

Step 2: Implement a rigorous Patch Strategy.

Disabling RDP will protect your environment, but many IT departments rely on it to do their jobs. However, if you replace RDP with another remote control solution, you can disable RDP and rest easy.

Syxsense provides a secure Remote Control solution. Utilizing 2048-bit encryption, our product communicates securely between the accessing device and the target. You can also enable prompts for the user on the target to allow, or disprove, access.

Patching your devices is also critical for maintaining a secure environment. Using Syxsense, you can implement a patching strategy that keeps your devices up to date. Our Patch Manager shows you, at a glance, which devices need patching. Tasks can be set to happen on an automated schedule to work around business hours. Replace RDP with Syxsense and experience a free trial today.

[vc_single_image image=”13186″ img_size=”200×200 px” alignment=”center”]

[vc_separator css=”.vc_custom_1494871528028{padding-top: 15px !important;padding-bottom: 5px !important;}”]

Start Patching

Start a free, 14-day trial of Syxsense, which helps organizations from 50 to 10,000 endpoints monitor and manage their environment, all from just a web browser. An email will be automatically sent to the address you provide.

[dt_default_button link=”url:https%3A%2F%2Fdev-syxsense.pantheonsite.io%2Fsyxsense-trial%2F|||” size=”big” button_alignment=”btn_center”]START FREE TRIAL[/dt_default_button]