Service:
Protocol:
TCPPort:
3389Used for:
Remote desktop access to Windows systemsWhy It’s Open
RDP is the standard way to remotely manage Windows servers and desktops via GUI. It’s widely used in enterprise IT and remote support environments.
Common Risks
- BlueKeep (CVE-2019-0708): A critical wormable vulnerability.
- Brute Force Attacks: Common target for weak password cracking.
- Credential Theft: Via clipboard sharing or keylogging malware.
- Exposed to Internet: Big no-no without additional hardening.
Want to save time on reporting?
Let PentestPad generate, track, and export your reports - automatically.

Enumeration & Testing
Nmap enumeration
nmap -p 3389 -sVnmap -p 3389 --script rdp-enum-encryption
rdesktopWhat to Look For
| Checkpoint | What it means |
|---|---|
| RDP open to internet | Major attack surface |
| Weak/NX auth configs | May allow MITM or downgrade attacks |
| Unpatched Windows | BlueKeep or other RDP exploits possible |
Known Exploits
- CVE-2019-0708 - BlueKeep
A critical remote code execution (RCE) vulnerability in Remote Desktop Services that allows unauthenticated attackers to execute arbitrary code without user interaction.
Affected Systems: Windows XP, Windows 7, Windows Server 2003, and Windows Server 2008.
Impact: Potential for wormable attacks similar to WannaCry.
- CVE-2012-0002 - MS12-020
A vulnerability in the RDP implementation that allows remote attackers to execute arbitrary code by sending specially crafted RDP packets.
Affected Systems: Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, and Windows 7.
Impact: Could lead to system compromise.
- CVE-2018-0886 - CredSSP Vulnerability
A vulnerability in the Credential Security Support Provider protocol (CredSSP) that could allow remote code execution if an attacker intercepts and modifies RDP sessions.
Affected Systems: Multiple versions of Windows, including Windows 7, Windows Server 2012, and Windows 10.
Impact: Man-in-the-middle attacks leading to credential theft and code execution.
- CVE-2020-0609 & CVE-2020-0610 - BlueGate
Remote code execution vulnerabilities in Windows Remote Desktop Gateway (RD Gateway) that allow unauthenticated attackers to execute arbitrary code by sending specially crafted requests.
Affected Systems: Windows Server 2012, 2012 R2, 2016, and 2019.
Impact: Potential for full system compromise via RD Gateway.
🔗 Microsoft Advisory for CVE-2020-0609
🔗 Microsoft Advisory for CVE-2020-0610
Mitigation
- Use RDP gateways and VPNs.
- Enable Network Level Authentication (NLA).
- Limit logins with account lockout policies.
- Monitor login attempts and user behavior.
Real-World Example
The BlueKeep vulnerability was exploited in real-world attacks, allowing remote code execution on unpatched Windows machines across the internet.
TL;DR
- Service: Remote Desktop Protocol (RDP)
- Default Port: 3389
- Risks: Unauthenticated RCE, wormable exploit
- Mitigation: Apply patches, enable Network Level Authentication, restrict access