Customer Advisory: Windows Vulnerability Patches (January 14, 2020)

Robert Plamondon -

We would like to ensure all of our customers are aware of the patches released from Microsoft on Tuesday, January 14, 2020 that address vulnerabilities in Microsoft's Remote Desktop Gateway, Remote Desktop Client, and CryptoAPI. Please see this CISA advisory for further details on the vulnerabilities: https://www.us-cert.gov/ncas/alerts/aa20-014a.

Call to Action

All Windows virtual machines are vulnerable without immediate installation of updates.

 Systems that require update include:

  • Workspot Enterprise Connector server(s)
  • Remote Desktop Gateway server(s)
  • Persistent VDI Pool desktops
  • VDI Templates

All of these devices should be included in your monthly patching routines as a matter of standard IT practice. Now is an excellent time to ensure that is indeed the case.

Additionally, please remember to patch your VDI Templates and each Persistent VDI desktop. (Non-persistent desktops just need the template updated with the appropriate patch(es) and refreshed.)

 If you have any questions or need assistance, please open a ticket via Workspot Control.

Related Documents

Have more questions? Submit a request

Comments

Powered by Zendesk