Synopsis
The remote Windows host has Terminal Services enabled.
Description
Terminal Services allows a Windows user to remotely obtain a graphical login (and therefore act as a local user on the remote host).
If an attacker gains a valid login and password, this service could be used to gain further access on the remote host. An attacker may also use this service to mount a dictionary attack against the remote host to try to log in remotely.
Note that RDP (the Remote Desktop Protocol) is vulnerable to Man-in-the-middle attacks, making it easy for attackers to steal the credentials of legitimate users by impersonating the Windows server.
Solution
Disable Terminal Services if you do not use it, and do not allow this service to run across the Internet.
Plugin Details
File Name: windows_terminal_services.nasl
Agent: windows
Supported Sensors: Nessus Agent
Vulnerability Information
CPE: cpe:/a:microsoft:windows_2000_terminal_services
Excluded KB Items: global_settings/disable_service_discovery