As per the FreeRDP team this issue in the server resulted in a fix in the client. Now all you need to do is upgrade your server and you are good to go. VMs running Windows Server 2016 and Windows 10 Anniversary Update are vulnerable. VMs on older versions of Windows are not at risk. As per the FreeRDP team this issue in the server resulted in a fix in the client. Now all you need to do is upgrade your server and you are good to go. VMs running Windows Server 2016 and Windows 10 Anniversary Update are vulnerable. VMs on older versions of Windows are not at risk.

How to check if my Windows VM is vulnerable?

To check if your VM is vulnerable, you need to open a command prompt and enter rdpcontrol getversion. The version number will be 2016 or 10. The following diagram illustrates the vulnerability:

Many small businesses don't have the time, skills, or expertise necessary to handle everything that comes with a solid SEO strategy. From keyword research to content evaluation, from page optimization to internal linking, it's easy for companies to end up with a generic web presence that doesn't inspire engagement or drive conversions. This is especially true for businesses who find themselves in an unfamiliar or demanding industry where there are many competing companies that are masters of their craft. Outsourcing SEO services can be just what these struggling companies need so they can focus on other aspects of the business, such as developing products or opening new markets without neglecting their online presence. Because it's not enough to simply weave in popular keywords and deliver high-quality content; brands also need to consider the entire user experience as well as how search engines are evaluating your content. With this thinking in mind, outsourced SEO ensures your digital presence is generating maximum impact and capturing the most prospective customers possible.

CVE-2022-39315

This was a vulnerability in the FreeRDP client that was fixed in the server. Now all you need to do is upgrade your server and you are good to go. VMs running Windows Server 2016 and Windows 10 Anniversary Update are vulnerable. VMs on older versions of Windows are not at risk.

FreeRDP Vulnerability

FreeRDP is an open-source implementation of the RDP protocol, which is the standard for remote desktop protocol. It supports a wide variety of platforms and operating systems, including Windows, Linux, macOS, Android, and ChromeOS. FreeRDP has multiple vulnerabilities that can be exploited by attackers to gain control over systems running the software.

1) One of these vulnerabilities allows an attacker to bypass authentication mechanisms on systems running the software.
2) Another vulnerability in the software could allow an attacker to escalate their privileges on vulnerable systems or cause a denial-of-service (DoS) attack via a specially crafted RDP packet.

What is FreeRDP?

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP) that can be used on any operating system. It offers the complete RDP experience, including all graphical sessions, audio and video call support, clipboard integration and text support. FreeRDP also includes an updated RDP client for Windows 10 PCs that is compatible with RemoteFX 4.0 graphics acceleration technology.
FreeRDP provides a solution to users who need to access remote files or printers from their desktop with no add-ons or extra software required. It also allows users to connect multiple computers to one monitor in order to further optimize productivity and make multi-monitor setups more efficient. Additionally, FreeRDP is designed for server installations where it can work as a replacement for the Microsoft Remote Desktop Connection service on Windows Server 2008 SP2 R2 and higher.

Windows Server 2016 and Windows 10 Anniversary Update are vulnerable

The vulnerabilities fixed in the server are CVE-2022-39316 and CVE-2017-11826. The patches released by Microsoft for these vulnerabilities were released in July and August of this year, respectively.

Timeline

Published on: 11/16/2022 20:15:00 UTC
Last modified on: 11/18/2022 21:10:00 UTC

References