



An attacker who successfully exploited this vulnerability could relay user credentials and use them to execute code on the target system.ĬredSSP is an authentication provider which processes authentication requests for other applications any application which depends on CredSSP for authentication may be vulnerable to this type of attack.Īs an example of how an attacker could exploit this vulnerability against Remote Desktop Protocol, the attacker would need to run a specially crafted application and perform a man-in-the-middle attack against a Remote Desktop Protocol session. A remote code execution vulnerability exists in the Credential Security Support Provider protocol ( CredSSP).
