CVE-2021-38665
📋 TL;DR
CVE-2021-38665 is a Remote Desktop Protocol (RDP) client information disclosure vulnerability that allows an attacker to read memory contents from the RDP client. This affects Windows systems running vulnerable RDP clients when connecting to a malicious RDP server. The vulnerability could expose sensitive information like credentials or other data in memory.
💻 Affected Systems
- Windows Remote Desktop Client
📦 What is this software?
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 10 by Microsoft
Windows 11 by Microsoft
Windows 11 by Microsoft
Windows 7 by Microsoft
Windows 8.1 by Microsoft
Windows Rt 8.1 by Microsoft
⚠️ Risk & Real-World Impact
Worst Case
An attacker controlling a malicious RDP server could extract sensitive information from client memory, potentially including authentication credentials, session tokens, or other confidential data.
Likely Case
Information disclosure of memory contents from RDP client sessions, potentially exposing system information or partial credential data.
If Mitigated
Limited or no information disclosure if proper network segmentation and RDP security controls are implemented.
🎯 Exploit Status
Requires user to connect to attacker-controlled RDP server. No authentication bypass needed but requires user interaction.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: October 2021 security updates (KB5006670 for Windows 10 2004, 20H2, 21H1; KB5006669 for Windows 11; etc.)
Vendor Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38665
Restart Required: Yes
Instructions:
1. Apply October 2021 Windows security updates via Windows Update. 2. For enterprise environments, deploy through WSUS or Microsoft Endpoint Configuration Manager. 3. Restart systems after patch installation.
🔧 Temporary Workarounds
Restrict RDP connections
windowsConfigure RDP client to only connect to trusted RDP servers using Group Policy or local settings.
Enable Network Level Authentication
windowsRequire NLA for all RDP connections to prevent connection to untrusted servers.
🧯 If You Can't Patch
- Implement strict network segmentation to control which RDP servers users can connect to.
- Use application allowlisting to restrict which RDP clients can be used and enforce connection policies.
🔍 How to Verify
Check if Vulnerable:
Check Windows version and compare with affected versions list. Systems without October 2021 security updates are vulnerable.
Check Version:
winver
Verify Fix Applied:
Verify October 2021 security updates are installed via 'winver' command or Windows Update history.
📡 Detection & Monitoring
Log Indicators:
- Windows Event Logs showing RDP connections to unknown/untrusted servers
- Unexpected RDP client memory access patterns
Network Indicators:
- RDP connections to suspicious or unknown IP addresses
- Unusual RDP traffic patterns from clients
SIEM Query:
EventID=4624 AND LogonType=10 AND TargetUserName NOT IN (trusted_users) | stats count by SourceNetworkAddress