![]() ![]() ![]() Moreover, clients with this patch could not communicate with unpatched servers. They made it compulsory for both client and server computers to install the update for streamlined functioning. Many servers had to be rebooted as people thought it was a server-side error!įortunately, Microsoft was aggressive in their stance to tighten the security of applications. Unfortunately, this code patch created some ripples, which lead to authentication errors in the Remote Desktop Protocol (RDP) of a Windows server.įurther, a CredSSP error resulted in Windows servers becoming inaccessible via RDP for many users. On 8th May 2018, Microsoft launched a patch to fix gaping vulnerabilities exposed in the CredSSP module. ![]()
0 Comments
Leave a Reply. |