Windows Server 2012 DirectAccess IP-HTTPS Security Vulnerability

As a part of the December 2012 security update release, Microsoft included a fix to address a security vulnerability in IP-HTTPS, an important component used in DirectAccess on Windows Server 2012. IP-HTTPS is an IPv6 transition protocol that utilizes SSL/TLS to tunnel IPv6 traffic from the DirectAccess client to the DirectAccess server. This vulnerability could potentially allow a DirectAccess client to connect to a Windows Server 2012 DirectAccess server with a revoked computer certificate. It is important to understand that this vulnerability would not grant the DirectAccess client full access to the corporate network unless the DirectAccess client also had an active computer account and the user provided valid domain credentials. Best practices dictate that a lost or stolen DirectAccess computer should have its computer account disabled in addition to revoking its computer certificate. You can find additional information about this vulnerability here.

Leave a comment

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: