Carnegie Mellon University
March 17, 2012

Action Needed-Security Alert: Run Windows Update Today - Increased Risk in Microsoft Remote Desktop Protocol Vulnerability

Due to an increase in malicious activity related to the Microsoft Remote Desktop Protocol (RDP) vulnerability announced on March 15, Computing Services advises that you take the following precautions:

ACTIONS REQUIRED FOR EVERYONE:

  • Run Windows Update and install the latest security updates.
    Visit http://windowsupdate.microsoft.com. If prompted, please restart your computer.
  • If you are not using Remote Desktop, disable it. (DSP customers should NOT disable Remote Desktop.)
    On your Windows computer, go to Control Panel > System > Remote Access and select “Don’t allow connections to this computer”. Click OK.
  • Set a strong account password.
    For more information, see http://www.cmu.edu/computing/accounts/passwords/.


ADDITIONAL STEPS FOR INDIVIDUALS USING REMOTE DESKTOP PROTOCOL:

In order to maintain the security of university data, it is likely that Computing Services will restrict access to its computing resources by blocking direct RDP connections through port 3389 from the Internet. Individuals using RDP will need to access these resources using a VPN connection.

Please take the following steps:

  • Install and configure the Cisco AnyConnect VPN client.
    Documentation on how to so install and connect using VPN is available athttp://www.cmu.edu/computing/network/vpn/client/.
  • Establish a connection using the Cisco AnyConnect VPN client before accessing university systems over the CMU Wireless network or from off-campus connections. (DSP customers should already have Cisco AnyConnect VPN installed on their work computers.)

NOTE: You must have administrative access to your computer to complete the above steps. Please consult your departmental computing administrator or DSP consultant prior to making any system changes.

ADDITIONAL INFORMATION

For additional information, please read Computing Services Security Alert: Critical Vulnerability in Microsoft Remote Desktop Protocol https://www.cmu.edu/computing/news/security/2012/mar/031312rdp.html

CONTACT

Please direct any questions or comments to the Computing Services Help Center (412-268-HELP or it-help@cmu.edu) or to your departmental administrator or DSP consultant.