Windows Terminal Services Enabled

info Nessus Plugin ID 10940


The remote Windows host has Terminal Services enabled.


Terminal Services allows a Windows user to remotely obtain a graphical login (and therefore act as a local user on the remote host).

If an attacker gains a valid login and password, this service could be used to gain further access on the remote host. An attacker may also use this service to mount a dictionary attack against the remote host to try to log in remotely.

Note that RDP (the Remote Desktop Protocol) is vulnerable to Man-in-the-middle attacks, making it easy for attackers to steal the credentials of legitimate users by impersonating the Windows server.


Disable Terminal Services if you do not use it, and do not allow this service to run across the Internet.

Plugin Details

Severity: Info

ID: 10940

File Name: windows_terminal_services.nasl

Version: 1.39

Type: remote

Agent: windows

Family: Windows

Published: 4/20/2002

Updated: 5/24/2022

Asset Inventory: true

Supported Sensors: Nessus Agent

Vulnerability Information

CPE: cpe:/a:microsoft:windows_2000_terminal_services

Excluded KB Items: global_settings/disable_service_discovery