In line with the information story, Microsoft mentioned the conduct is “a design choice to make sure that not less than one person account at all times has the power to log in irrespective of how lengthy a system has been offline.” As such, Microsoft mentioned the conduct doesn’t meet the definition of a safety vulnerability, and firm engineers haven’t any plans to vary it.
Home windows admins are sometimes not conscious of credential caching, mentioned Johannes Ullrich, dean of analysis on the SANS Institute. “The characteristic is meant to make it much less possible for an admin to be logged out of their system. To stop this, RDP will cache the final set of credentials used, in case the server isn’t in a position to join again to the authentication server (which today is commonly within the cloud). An administrator altering credentials within the cloud could discover that the outdated credentials will nonetheless work in consequence.”
To use this, Ullrich added, an attacker should first be taught the outdated credentials, they usually should use them earlier than the administrator makes use of their new credentials. “Securing RDP is, nonetheless, a crucial activity, and never straightforward, even with out this drawback. Directors should discover methods to supply robust authentication they usually should isolate RDP endpoints as a lot as potential,” he mentioned.