


Unfortunately, a remote code execution vulnerability existed in the protocol!įurther, if an attacker were to exploit this loophole, they could access user credentials and execute malicious code on the target machine. Further, it uses TLS (Transport Layer Security) to make the transfer safe. Moreover, it does this by securely transporting user credentials from a client computer to a Windows server via an encrypted pipe. What is Credential Security Support Provider Protocol?įirstly, CredSSP protocol is an authentication provider that takes on “outsourced” authentication requests from third-party applications and processes them.

Therefore, to know how to fix the CredSSP error during Remote Desktop or RDP in Windows, read on! However, you can “reinstate” this communication by rolling back the update, as we will show you below. Moreover, clients with this patch could not communicate with unpatched servers. They made it compulsory for both client and server computers to install the update for streamlined functioning. Many servers had to be rebooted as people thought it was a server-side error!įortunately, Microsoft was aggressive in their stance to tighten the security of applications. Unfortunately, this code patch created some ripples, which lead to authentication errors in the Remote Desktop Protocol (RDP) of a Windows server.įurther, a CredSSP error resulted in Windows servers becoming inaccessible via RDP for many users. On 8th May 2018, Microsoft launched a patch to fix gaping vulnerabilities exposed in the CredSSP module.
