Microsoft announced this week that has deprecated Remote Desktop Connection Manager (RDCMan) due to security concerns.
The application has been around for decades, providing users with the ability to manage multiple remote desktop connections, but Microsoft has long been investing in other solutions to provide users with remote desktop access.
In a support article published last year, the tech giant encouraged users to switch to in-box remote desktop client (MSTSC) or universal Remote Desktop client instead, arguing that RDCMan “has not kept pace with the level of advanced technology” that the company has been aiming for.
“These clients offer increased security, and they are a key part of our engineering roadmap moving forward. In the future, you can expect even more capabilities, such as the ability to better manage multiple connections,” Microsoft said in July 2019.
This week, on March 2020 Patch Tuesday, Microsoft revealed that RDCMan is plagued by an information disclosure that would not be addressed, as the application has been deprecated.
Tracked as CVE-2020-0765, the vulnerability exists when RDCMan improperly parses XML input that contains reference to an external entity. This could allow an attacker to read arbitrary files via an XML external entity (XXE) declaration.
“To exploit the vulnerability, an attacker could create an RDG file containing specially crafted XML content and convince an authenticated user to open the file,” Microsoft said in an advisory.
The security flaw, which was found to affect Remote Desktop Connection Manager 2.7, has a moderate severity rating, with no mitigating factors identified. No workaround for the issue has been identified either.
However, the tech giant explains that it is not planning on releasing a patch for the vulnerability, and that it has deprecated the application.
“Microsoft recommends using supported Remote Desktop clients and exercising caution when opening RDCMan configuration files (.rdg),” the company notes.
Microsoft addressed a total of 115 vulnerabilities on the March 2020 Patch Tuesday, including 26 critical flaws in Windows, Word, Dynamics Business Central, and its web browsers.
On Thursday, the company released out-of-band updates to address a remote code execution bug in Windows’ Server Message Block 3.0 (SMBv3). Considered critical severity, the issue is believed to be wormable.
Related: Out-of-Band Windows Updates Patch Wormable SMB Vulnerability
Related: Microsoft Patches 115 Vulnerabilities in Windows, Other Products
Related: Attacks Targeting Recent Microsoft Exchange Flaw Ramping Up

More from Ionut Arghire
- Australian Man Sentenced for Scam Related to Optus Hack
- Chrome 110 Patches 15 Vulnerabilities
- Tor Network Under DDoS Pressure for 7 Months
- Russian Admits in US Court to Laundering Money for Ryuk Ransomware Gang
- Patient Information Compromised in Data Breach at San Diego Healthcare Provider
- Software Supply Chain Security Firm Lineaje Raises $7 Million
- Vulnerability Provided Access to Toyota Supplier Management Network
- Linux Variant of Cl0p Ransomware Emerges
Latest News
- ESXiArgs Ransomware Hits Over 3,800 Servers as Hackers Continue Improving Malware
- Minister: Cybercrimes Now 20% of Spain’s Registered Offenses
- Skybox Security Raises $50M, Hires New CEO
- Spies, Hackers, Informants: How China Snoops on the US
- Australian Man Sentenced for Scam Related to Optus Hack
- Chrome 110 Patches 15 Vulnerabilities
- Application Security Protection for the Masses
- Tor Network Under DDoS Pressure for 7 Months
