desktop-virtualization-community-VDI-UDS-EnterpriseJOIN OUR


NSA urges to patch legacy versions of Windows

Posted by UDS Enterprise TeamNSA urges to patch legacy versions of Windows 2019-06-07 UDS Enterprise TeamNSA urges to patch legacy versions of Windows

The National Security Agency of the United States (NSA) warns in an advisory to all administrators and users of Windows to check that their system is updated and patched against the latest threats. They refer to BlueKeep, a vulnerability of the remote desktop protocol of Microsoft OS (RDP) affecting Windows 7, Windows XP, Windows Server 2003 and 2008.


Microsoft released a patch for this security flaw, but the NSA reminds that millions of devices are still potentially vulnerable. BlueKeep could cause devastating damage to systems that have not been patched with a powerful impact and infect all the devices connected to the same network, since it can be exploited as a "worm". This means that it can be spread accross the Internet without the interaction of a user, so cybercriminals could launch an attack automatically to all affected systems.

The US agency advises to use only operating systems compatible with the latest patches that keep systems safe from BlueKeep and recommends taking a series of additional measures:

  • Block TCP port 3389 in firewalls exposed to the Internet.

  • Enable network level authentication.

  • Disable remote desktop services if they are not being used.

Thanks to the features of the UDS Tunneler it is unlikely that UDS Enterprise users who access from the Internet will be affected by the issues above described, since this component ensures the security of all connections over the Internet through a secure tunnel.

In any case, and to guarantee that security of the VDI platform remains intact, the connection broker team advises administrators deploying virtual desktops with the aforementioned versions of Windows following the NSA's recommendations and installing the corresponding security patches to avoid possible issues.

For more information, see NSA cybersecurity advisory



You must authenticate to review this post