
Shocking Security Flaw: Windows Remote Desktop Allows Access with Revoked Passwords!
2025-04-30
Author: Lok
Microsoft's Alarming Decision on Remote Login Protocol
In a baffling turn of events, Microsoft has confirmed that it will not modify a crucial remote login protocol within Windows that permits users to access machines using passwords that have been revoked. This decision raises eyebrows, given that changing one's password is a fundamental step in securing accounts after a potential breach.
What Is This Remote Desktop Protocol Headache?
The Remote Desktop Protocol (RDP) is a Microsoft technology that allows users to log into and control a computer from afar as though they are sitting right in front of it. Surprisingly, it may continue to authenticate old passwords long after they’ve been changed. Microsoft defends this as a design choice to prevent users from being locked out of their accounts.
Revealing the Security Flaw
Security researcher Daniel Wade spotlighted this alarming behavior in a recent report to the Microsoft Security Response Center. His findings indicate a stark contradiction to user expectations: when they change their password, they believe they have secured their accounts. However, under RDP, old passwords may still work, even from fresh devices.
The Trust Breakdown: A Disturbing Reality
Wade warned, "This isn't just a bug. It’s a trust breakdown." With millions of users—spanning individuals, small businesses, and hybrid setups—potentially exposed, the implications are staggering. The protocol allows previous credentials to remain functional indefinitely, undermining trusted security practices.
Why This Issue Matters
The risk intensifies if a user's Microsoft or Azure account is compromised. In incidents where passwords are leaked, users are urged to change them immediately. Yet, the old password may still grant an attacker access to their devices via RDP, creating what Wade describes as a "silent, remote backdoor" into systems.
Credential Caching: The Hidden Culprit
This bizarre behavior can be traced back to credential caching on the local machine. When a user first logs in with their Microsoft or Azure credentials, RDP validates the password online and then stores it securely on the machine. Consequently, any future RDP logins reference this cached password instead of checking online, allowing revoked passwords to grant access.
Microsoft's Response: What Users Need to Know
In reaction to Wade’s discovery, Microsoft updated its documentation to inform users about this caching behavior—but not before sparking significant concern among security experts. Will Dormann, a senior vulnerability analyst, criticized Microsoft's vague advisories that fail to provide clear steps for users to safeguard their RDP access.
What Should You Do?
To protect against potential exploitation, experts recommend configuring RDP to only authenticate using locally stored credentials. Despite users’ frustrations and the urgency of the situation, Microsoft has not indicated any immediate plans to rectify this oversight.
A Call for Accountability
As Microsoft acknowledges that findings have been received before, it raises the question: why is this pervasive flaw still unresolved? Addressing these vulnerabilities must become a priority, as millions of unsuspecting users could be facing risks they don’t even know exist.