PatchSiren

PatchSiren cyber security CVE debrief

CVE-2005-1794 Microsoft CVE debrief

CVE-2005-1794 is a legacy Microsoft Remote Desktop Protocol (RDP) issue in which RDP 5.2 stored an RSA private key in mstlsapi.dll and used it to sign a certificate. That design flaw could let a remote attacker spoof the public key of a legitimate server and conduct man-in-the-middle interception of RDP sessions. The issue is historical, but it remains relevant anywhere older Terminal Services or RDP 5.2 components are still present.

Vendor
Microsoft
Product
Windows Terminal Services
CVSS
MEDIUM 6.4
CISA KEV
Not listed in stored evidence
Original CVE published
2005-06-01
Original CVE updated
2026-04-16
Advisory published
2005-06-01
Advisory updated
2026-04-16

Who should care

Organizations that still operate Microsoft Terminal Services or other legacy RDP 5.2 deployments, especially administrators of remote access infrastructure, endpoint teams, and defenders responsible for certificate and session trust on Windows systems.

Technical summary

According to the NVD record and linked vendor/advisory references, the vulnerable implementation in Microsoft Terminal Server using RDP 5.2 kept an RSA private key in mstlsapi.dll. Because that key was available to the component that generated/signs the certificate, an attacker could potentially impersonate the expected server key material and intercept or alter traffic in a man-in-the-middle position. The affected CPEs listed by NVD include Microsoft Remote Desktop Connection 5.1.2600.2180 on Windows XP and Microsoft Windows Terminal Services using RDP 5.2.

Defensive priority

Medium priority for any environment that still exposes or depends on the affected legacy RDP stack; lower urgency for organizations that have already eliminated RDP 5.2 from production. The main risk is session interception and server impersonation rather than service disruption.

Recommended defensive actions

  • Inventory systems for the affected Microsoft RDP/Terminal Services versions listed in NVD.
  • Treat any remaining RDP 5.2 deployment as legacy and high-risk from a trust perspective.
  • Follow Microsoft/vendor guidance referenced in the advisory materials and replace or update vulnerable components where supported.
  • Restrict remote access exposure with network controls, VPNs, and strong authentication while legacy systems are being retired.
  • Validate certificate and server identity controls for remote administration paths to reduce MITM risk.
  • Prioritize remediation if the affected stack is still reachable from untrusted networks.

Evidence notes

The vulnerability description, CVSS vector (AV:N/AC:L/Au:N/C:P/I:P/A:N), and affected Microsoft CPEs come from the NVD record. The MITRE-linked vendor advisory reference explicitly points to the RDP GBU advisory PDF, and the public references also include Secunia, SecurityFocus, ICS-CERT, and OVAL entries. No KEV listing is present in the supplied enrichment data.

Official resources

CVE published 2005-06-01; supplied NVD record last modified 2026-04-16. No CISA KEV entry is indicated in the supplied data.