• Skip to main content
  • Skip to primary navigation
  • Skip to primary sidebar
  • UC Berkeley
  • Berkeley Engineering
  • EECS
Header Search Widget
IRIS

Instructional & Research Information Systems

  • About Us
  • Get Started
  • Get Help
  • FAQ
    • FAQ: Accounts
    • FAQ: EECS Slack
    • FAQ: File Storage
    • FAQ: Hardware
    • FAQ: MacOS
    • FAQ: Mail
    • FAQ: Mailing Lists
    • FAQ: Network
    • FAQ: Security
    • FAQ: Unix
    • FAQ: Web
    • FAQ: Windows
  • Services
    • Accounts
    • Backups
    • E-mail
    • EECS Login Servers
    • File Storage
    • Infrastructure
    • Mailing Lists
    • Network
    • Printing
    • Room Reservations
    • Security
    • Software
    • Unix
    • Web
  • Policies
  • Forms
    • System Registration/Update
    • Account Request Form
    • Network Problem Report
    • Project Storage Request
    • SSL Certificate Request
    • All Other Forms
  • Rates

Urgent Microsoft RDP patch (MS12-020)

March 17, 2012 by Lars Rohrbach

A critical vulnerability in the Remote Desktop Protocol (RDP) is addressed by a patch that Microsoft released for the March 2012 Patch Tuesday (patch MS12-020).

Exploit code for the RDP vulnerability has been made available online, so it’s especially important that this patch be applied as soon as possible to any Windows machines that have RDP enabled. Note that the campus Minimum Security Standard for Networked Devices dictates that

All currently available security patches must be applied on a schedule appropriate to the severity of the risk they mitigate.

We encourage you to apply all relevant Microsoft updates for any Windows machines you manage.

See also:

  • Microsoft Issues Urgent Patch for ‘Wormable’ RDP Vulnerability (PC World)
  • Critical update for Windows Remote Desktop (Berkeley Security website)

Filed Under: News

Primary Sidebar

IRIS Service Status

Green
We have 0 Active Incidents, and 0 Scheduled Maintenances noted.

IST Service Status

Outages to campus services are listed at berkeley.statusdashboard.com.
  • About
  • Contact
  • Privacy
  • Accessibility
  • Nondiscrimination

© 2022–2025 UC Regents  |  Log in