Information
Some versions of the CredSSP protocol that is used by some applications (such as Remote Desktop Connection) are vulnerable to an encryption oracle attack against the client. This policy controls compatibility with vulnerable clients and servers and allows you to set the level of protection desired for the encryption oracle vulnerability.
The recommended state for this setting is: Enabled: Force Updated Clients
This setting is important to mitigate the CredSSP encryption oracle vulnerability, for which information was published by Microsoft on 03/13/2018 in
CVE-2018-0886 | CredSSP Remote Code Execution Vulnerability
. All versions of Windows from Windows Vista onwards are affected by this vulnerability, and will be compatible with this recommendation provided that they have been patched at least through May 2018 (or later).
Solution
To establish the recommended configuration via configuration profiles, set the following Settings Catalog path to Enabled: Force Updated Clients
Administrative Templates\System\Credentials Delegation\Encryption Oracle Remediation
Impact:
Client applications which use CredSSP will not be able to fall back to the insecure versions and services using CredSSP will not accept unpatched clients. This setting should not be deployed until all remote hosts support the newest version, which is achieved by ensuring that all Microsoft security updates at least through May 2018 are installed.