Security News > 2019 > June > Hackers Can Bypass Windows Lockscreen on Remote Desktop Sessions

2019-06-04 17:39
The Network Level Authentication (NLA) feature of Windows Remote Desktop Services (RDS) can allow a hacker to bypass the lockscreen on remote sessions, and there is no patch from Microsoft, the CERT Coordination Center at Carnegie Mellon University warned on Tuesday. read more
News URL
Related news
- Update VMware Tools for Windows Now: High-Severity Flaw Lets Hackers Bypass Authentication (source)
- Microsoft replacing Remote Desktop app with Windows App in May (source)
- Critical flaw in Next.js lets hackers bypass authorization (source)
- Broadcom warns of authentication bypass in VMware Windows Tools (source)
- Microsoft: Recent Windows updates cause Remote Desktop issues (source)
- Recent Windows Server 2025 updates cause Remote Desktop freezes (source)
- Microsoft fixes Remote Desktop issues caused by Windows updates (source)
- New Windows 11 trick lets you bypass Microsoft Account requirement (source)
- Windows 11 Forces Microsoft Account Sign In & Removes Bypass Trick Option (source)
- Microsoft Credits EncryptHub, Hacker Behind 618+ Breaches, for Disclosing Windows Flaws (source)