I was dealing with a security vulnerability and wasn’t having much luck finding how to fix this issue online. I finally came across a few website posts that got me a little closer to what I was looking for. The full solution can be found below:
Here’s the report:
This host is running Remote Desktop Protocol server and is prone to information disclosure vulnerability.
Vulnerability Detection Result
Vulnerability was detected according to the Vulnerability Detection Method.
Successful exploitation could allow remote attackers to gain sensitive information.
Impact Level: System/Application
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
A Workaround is to connect only to terminal services over trusted networks.
All Microsoft-compatible RDP (5.2 or earlier) softwares
The flaw is due to RDP server which stores an RSA private key used for signing a terminal server’s public key in the mstlsapi.dll library, which allows remote attackers to calculate a valid signature and further perform a man-in-the-middle (MITM) attacks to obtain sensitive information.
Vulnerability Detection Method
Details: Microsoft RDP Server Private Key Information Disclosure Vulnerability (OID: 18.104.22.168.4.1.25622.214.171.1242658)
Version used: $Revision: 1559 $
Here’s the solution:
- Start > Administrative Tools > Remote Desktop Connection Configuration (Or something similar to that)
- Right click on RDP-Tcp and go to Properties
- In General, set the layer to SSL TS1, Set the level to High, and choose a public SSL Cert if you’ve got one.
That should do it. Let me know if this works the same for you. Cheers.