![]() ![]() ![]() Many servers had to be rebooted as people thought it was a server-side error!įortunately, Microsoft was aggressive in their stance to tighten the security of applications. Unfortunately, this code patch created some ripples, which lead to authentication errors in the Remote Desktop Protocol (RDP) of a Windows server.įurther, a CredSSP error resulted in Windows servers becoming inaccessible via RDP for many users. On 8th May 2018, Microsoft launched a patch to fix gaping vulnerabilities exposed in the CredSSP module.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |