Windows Terminal Services Enabled

info Nessus Plugin ID 10940
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote Windows host has Terminal Services enabled.


Terminal Services allows a Windows user to remotely obtain a graphical login (and therefore act as a local user on the remote host).

If an attacker gains a valid login and password, this service could be used to gain further access on the remote host. An attacker may also use this service to mount a dictionary attack against the remote host to try to log in remotely.

Note that RDP (the Remote Desktop Protocol) is vulnerable to Man-in-the-middle attacks, making it easy for attackers to steal the credentials of legitimate users by impersonating the Windows server.


Disable Terminal Services if you do not use it, and do not allow this service to run across the Internet.

Plugin Details

Severity: Info

ID: 10940

File Name: windows_terminal_services.nasl

Version: 1.38

Type: remote

Agent: windows

Family: Windows

Published: 4/20/2002

Updated: 7/8/2020

Dependencies: find_service2.nasl

Asset Inventory: true

Vulnerability Information

CPE: cpe:/a:microsoft:windows_2000_terminal_services

Excluded KB Items: global_settings/disable_service_discovery