This script is Copyright (C) 2014-2017 Tenable Network Security, Inc.
The remote Windows host is affected by a security bypass
The remote Windows host is running Remote Desktop Protocol, which does
not properly log failed logon attempts, thus allowing attackers to
bypass the audit logon security feature.
See also :
Microsoft has released a set of patches for Windows Vista, 2008, 7,
2008 R2, 8, 2012, 8.1, and 2012 R2.
Risk factor :
Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 4.3
Public Exploit Available : false