Microsoft announced this week that has deprecated Remote Desktop Connection Manager (RDCMan) due to security concerns.
The application has been around for decades, providing users with the ability to manage multiple remote desktop connections, but Microsoft has long been investing in other solutions to provide users with remote desktop access.
In a support article published last year, the tech giant encouraged users to switch to in-box remote desktop client (MSTSC) or universal Remote Desktop client instead, arguing that RDCMan “has not kept pace with the level of advanced technology” that the company has been aiming for.
“These clients offer increased security, and they are a key part of our engineering roadmap moving forward. In the future, you can expect even more capabilities, such as the ability to better manage multiple connections,” Microsoft said in July 2019.
This week, on March 2020 Patch Tuesday, Microsoft revealed that RDCMan is plagued by an information disclosure that would not be addressed, as the application has been deprecated.
Tracked as CVE-2020-0765, the vulnerability exists when RDCMan improperly parses XML input that contains reference to an external entity. This could allow an attacker to read arbitrary files via an XML external entity (XXE) declaration.
“To exploit the vulnerability, an attacker could create an RDG file containing specially crafted XML content and convince an authenticated user to open the file,” Microsoft said in an advisory.
The security flaw, which was found to affect Remote Desktop Connection Manager 2.7, has a moderate severity rating, with no mitigating factors identified. No workaround for the issue has been identified either.
However, the tech giant explains that it is not planning on releasing a patch for the vulnerability, and that it has deprecated the application.
“Microsoft recommends using supported Remote Desktop clients and exercising caution when opening RDCMan configuration files (.rdg),” the company notes.
Microsoft addressed a total of 115 vulnerabilities on the March 2020 Patch Tuesday, including 26 critical flaws in Windows, Word, Dynamics Business Central, and its web browsers.
On Thursday, the company released out-of-band updates to address a remote code execution bug in Windows’ Server Message Block 3.0 (SMBv3). Considered critical severity, the issue is believed to be wormable.
Related: Out-of-Band Windows Updates Patch Wormable SMB Vulnerability
Related: Microsoft Patches 115 Vulnerabilities in Windows, Other Products
Related: Attacks Targeting Recent Microsoft Exchange Flaw Ramping Up

More from Ionut Arghire
- UAE-Linked APT Targets Middle East Government With New ‘Deadglyph’ Backdoor
- Xenomorph Android Banking Trojan Targeting Users in US, Canada
- $200 Million in Cryptocurrency Stolen in Mixin Network Hack
- Stealthy APT Gelsemium Seen Targeting Southeast Asian Government
- Nigerian Pleads Guilty in US to Million-Dollar BEC Scheme Role
- City of Dallas Details Ransomware Attack Impact, Costs
- In-the-Wild Exploitation Expected for Critical TeamCity Flaw Allowing Server Takeover
- Air Canada Says Employee Information Accessed in Cyberattack
Latest News
- Microsoft Adding New Security Features to Windows 11
- UAE-Linked APT Targets Middle East Government With New ‘Deadglyph’ Backdoor
- Sony Investigating After Hackers Offer to Sell Stolen Data
- The CISO Carousel and its Effect on Enterprise Cybersecurity
- Xenomorph Android Banking Trojan Targeting Users in US, Canada
- $200 Million in Cryptocurrency Stolen in Mixin Network Hack
- Stealthy APT Gelsemium Seen Targeting Southeast Asian Government
- Nigerian Pleads Guilty in US to Million-Dollar BEC Scheme Role
