Last week, we advised readers to apply Microsoft update MS12-020 sooner than later. For those of you that have — good work. And if you haven’t yet applied the patch — stop delaying.
Ever since MS12-020 was released, there’s been a flurry of activity attempting to “weaponize” the Remote Desktop Protocol (RDP) vulnerability. The race to an exploit is on and is in top gear. Lab Analyst Timo Hirvonen is tracking the situation on his Twitter account.
So… just how many computer could be affected by this RDP bug?
Well, researcher Dan Kaminsky scanned the Internet and estimates that there are millions of computers that are exposed.
What do you need to do?
Lenny Zeltser offers the following advice.
A good portion of our (enterprise) readership has probably already started taking action on this issue.
Consumers (home users) don’t generally have RDP enabled.
So… what does that leave us? Small and medium businesses.
As Casey John Ellis points out, Remote Desktop is very often enabled by outsourced IT contractors, and the small business owners may not have any idea that it’s enabled.
We have to agree with Ellis, small and medium business are at significant risk. Fortunately, Ellis and a friend have offered a helpful tool that a small business owner could use to access risk: RDPCheck.
To use RDPCheck, visit rdpcheck.com. From there, you can initiate a scan for vulnerabilities on your IP address.
Leave a reply