Remote Desktop Protocol Service Detection

info Nessus Plugin ID 10940


The remote host has an remote desktop protocol service enabled.


The Remote Desktop Protocol allows a user to remotely obtain a graphical login (and therefore act as a local user on the remote host).

If an attacker gains a valid login and password, this service could be used to gain further access on the remote host. An attacker may also use this service to mount a dictionary attack against the remote host to try to log in remotely.

Note that RDP (the Remote Desktop Protocol) is vulnerable to Man-in-the-middle attacks, making it easy for attackers to steal the credentials of legitimate users by impersonating the Windows server.


Disable the service if you do not use it, and do not allow this service to run across the Internet.

Plugin Details

Severity: Info

ID: 10940

File Name: windows_terminal_services.nasl

Version: 1.40

Type: remote

Published: 4/20/2002

Updated: 8/21/2023

Asset Inventory: true

Supported Sensors: Nessus

Vulnerability Information

CPE: cpe:/a:microsoft:windows_2000_terminal_services

Excluded KB Items: global_settings/disable_service_discovery