INTRODUCTION
Microsoft has released security bulletin MS14-025. To learn more about this security bulletin:
-
Home users:
https://www.microsoft.com/security/pc-security/updates.aspxSkip the details: Download the updates for your home computer or laptop from the Microsoft Update website now:
-
IT professionals:
How to obtain help and support for this security update
Support for Microsoft Update Security solutions for IT professionals:TechNet Security Troubleshooting and Support Help protect your Windows-based computer Windows from viruses and malware:Virus Solution and Security Center Local support according to your country:International Support
Help installing updates:More Information
Known issues and more information about this security update
The following articles contain more information about this security update as it relates to individual product versions. The articles may contain known issue information. If this is the case, the known issue is listed under each article link.
-
2928120 MS14-025: Description of the security update for Windows Remote Server Administration Tools for systems that have update 2919355 installed: May 13, 2014
-
2961899 MS14-025: Description of the security update for Windows Remote Server Administration Tools for systems that do not have update 2919355 installed: May 13, 2014
Group Policy Preferences
Overview
Some Group Policy Preferences can store a password. This functionality is being removed because the password was stored insecurely. This article describes the user interface changes and any available workarounds. The following Group Policy Preferences will no longer allow user names and passwords to be saved:
-
Drive Maps
-
Local Users and Groups
-
Scheduled Tasks
-
Services
-
Data Sources
This will affect the behavior of any existing Group Policy Objects (GPOs) in your environment that rely on passwords that are contained in these preferences. It will also prevent creating new Group Policy Preferences by using this functionality.
For Drive Maps, Local Users and Groups, and Services, you may be able to achieve similar goals through other, more secure functionality in Windows. For Scheduled Tasks and Data Sources, you will be unable to achieve the same goals that were available through the nonsecure functionality of Group Policy Preferences passwords.Scenarios
The following Group Policy Preferences are affected by this change. Each preference is covered briefly and then in more detail. Additionally, workarounds are provided that enable you to perform the same tasks.
Affected preference |
Applies to user |
Applies to computer |
Local user management |
Yes |
Yes |
Mapped drives |
Yes |
No |
Services |
No |
Yes |
Scheduled tasks (up-level) |
Yes |
Yes |
Scheduled tasks (down-level) |
Yes |
Yes |
Immediate tasks (up-level) |
Yes |
Yes |
Immediate tasks (down-level) |
Yes |
Yes |
Data sources |
Yes |
Yes |
Summary of changes
-
Password fields in all affected preferences are disabled. Administrators cannot create new preferences by using these password fields.
-
The username field is disabled in some preferences.
-
Existing preferences that contain a password cannot be updated. They can only be deleted or disabled, as appropriate for the specific preference.
-
The behavior for Delete and Disable actions have not changed for the preferences.
-
When an administrator opens any preference that contains the CPassword attribute, the administrator receives the following warning dialog box to inform him or her of the recent deprecation. Attempts to save changes to new or existing preferences that require the CPassword attribute will trigger the same dialog box. Only Delete and Disable actions will not trigger warning dialog boxes.
Scenario 1: Local user management
The Local User Management preference is frequently used to create local administrators who have a known password on a computer. This feature is not secure because of the way that Group Policy Preferences stores passwords. Therefore, this functionality is no longer available. The following preferences are affected:
-
Computer Configuration -> Control Panel Settings -> Local Users and Groups-> New-> Local User
-
User Configuration -> Control Panel Settings -> Local Users and Groups-> New-> Local User
Important changes
Action: Create or Replace
-
The User name, Password, and Confirm Password fields are disabled.
-
The warning dialog box appears when the administrator opens or tries to save any changes to an existing preference that contains a password.
-
The Password and Confirm Password fields are disabled.
-
The warning dialog box appears when the administrator opens or tries to save any changes to an existing preference that contains a password.
-
No change in behavior
Workarounds
Scenario 2: Mapped drives
Administrators use drive maps to allocate network locations to users. The password protection feature is used to make sure of authorized access to the drive. The following preferences are affected:
-
User Configuration -> Windows Settings -> Drive Maps -> New -> Mapped Drive
Important changes
Action: Create, Update, or Replace
-
The User name, Password, and Confirm password fields are disabled.
-
No change in behavior
Workarounds
Instead of using the password method for authentication, you can use Windows Explorer to manage share permissions and allocate rights to users. You can use Active Directory objects to control permissions to the folder.
Scenario 3: Services
You can use the Services preference to change service properties in such a way that they run in a context other than their original security context. The following preferences are affected:
-
Computer Configuration -> Control Panel Settings -> Services -> New -> Service
Important changes
Startup: No Change, Automatic, or Manual
-
The Password and Confirm password fields are disabled.
-
The administrator can use only built-in accounts.
-
No change in behavior
New dialog box
-
Administrators who try to use non-built-in users for This account" receive the following warning:
Workarounds
Services can still run as a local system account. Service permissions can be altered as documented in the following article in the Microsoft Knowledge Base:
256345 How to Configure Group Policy settings to set security for system services Note If the service that you want to configure is not present, you must configure the settings on a computer that has the service running.
Scenario 4: Scheduled and immediate tasks (up-level)
These are used to run scheduled tasks in a specific security context. The ability to store credentials for scheduled tasks to run as an arbitrary user when that user is not logged on is no longer available. The following preferences are affected. (Be aware that on some platforms, "At least Windows 7" is replaced with "Windows Vista and later.")
-
Computer Configuration -> Control Panel Settings -> Scheduled Tasks -> New -> Scheduled Task (At least Windows 7)
-
Computer Configuration -> Control Panel Settings -> Scheduled Tasks -> New -> Immediate Task (At least Windows 7)
-
User Configuration -> Control Panel Settings -> Scheduled Tasks -> New -> Scheduled Task (At least Windows 7)
-
User Configuration -> Control Panel Settings -> Scheduled Tasks -> New -> Immediate Task (At least Windows 7)
Important changes
Action: Create, Update, or Replace
-
When you select the Run whether user is logged on or not option, a dialog box no longer prompts the administrator for credentials.
-
The Do not store password check box is disabled. By default, the box is also checked.
Workarounds
For the "Scheduled Task (at least Windows 7)" and "Immediate Task (at least Windows 7)" tasks, administrators can use specific user accounts when the given user is logged on. Or, they can only have access to local resources as that user. These tasks still can run in the context of the local service.
Scenario 5: Scheduled and immediate tasks (down-level) This is the down-level version of preferences used to run Scheduled Tasks in a specific security context. The ability to store credentials for scheduled tasks to run as an arbitrary user when that user is not logged on is no longer available. The following preferences are affected:
-
Computer Configuration -> Control Panel Settings -> Scheduled Tasks -> New -> Scheduled Task
-
Computer Configuration -> Control Panel Settings -> Scheduled Tasks -> New -> Immediate Task (Windows XP)
-
User Configuration -> Control Panel Settings -> Scheduled Tasks -> New -> Scheduled Task
-
User Configuration -> Control Panel Settings -> Scheduled Tasks -> New -> Immediate Task (Windows XP)
Important changes
Action: Create, Update, or Replace
-
The Run as check box is disabled. Therefore, the User Name, Password, and Confirm Password fields are all disabled.
Workarounds
For the "Scheduled Task" and "Immediate Task (Windows XP)" items, scheduled tasks run by using the permissions that are currently available to the local service.
Scenario 6: Data Sources
The Data Sources preference is used to associate a data source with a computer or user. This feature no longer stores credentials to enable access to data sources that are protected by a password. The following preferences are affected:
-
Computer Configuration -> Control Panel Settings -> Data Sources
-
User Configuration -> Control Panel Settings -> Data Sources
Important Changes
Action: Create, Update, or Replace
-
The User Name, Password, and Confirm Password fields are disabled:
-
No change in behavior
Workarounds
No workarounds are available. This preference no longer stores credentials to allow access to data sources that are protected by a password.
Deprecation of CPassword
Removing CPassword
The Windows PowerShell script that is included in this Microsoft Knowledge Base article detects whether a domain contains any Group Policy Preferences that might use CPassword. If CPassword XML is detected in a given preference, it is displayed in this list.
Detecting CPassword preferences
Removing CPassword preferences
In order to remove the preferences that contain CPassword data, we suggest that you use Group Policy Management Console (GPMC) on the domain controller or from a client that has Remote Server Administration Tools installed. You can remove any preference in five steps on these consoles. To do this, follow these steps:
-
In GPMC, open the preference that contains CPassword data.
-
Change the action to Delete or Disable, as applicable to the preference.
-
Click OK to save your changes.
-
Wait for one or two Group Policy refresh cycles to allow changes to propagate to clients.
-
After changes are applied on all clients, delete the preference.
-
Repeat steps 1 through 5 as needed to clean your whole environment. When the detection script returns zero results, you are finished.
File name |
SHA1 hash |
SHA256 hash |
---|---|---|
Windows6.0-KB2928120-ia64.msu |
B2A74305CB56191774BFCF9FCDEAA983B26DC9A6 |
DCE8C0F9CEB97DBF1F7B9BAF76458B3770EF01C0EDC581621BC8C3B2C7FD14E7 |
Windows6.0-KB2928120-x64.msu |
386457497682A2FB80BC93346D85A9C1BC38FBF7 |
1AF67EB12614F37F4AC327E7B5767AFA085FE676F6E81F0CED95D20393A1D38D |
Windows6.0-KB2928120-x86.msu |
42FF283781CEC9CE34EBF459CA1EFE011D5132C3 |
016D7E9DBBC5E487E397BE0147B590CFBBB5E83795B997894870EC10171E16D4 |
Windows6.1-KB2928120-ia64.msu |
5C2196832EC94B99AAF9B074D3938525B7219690 |
9958FA58134F55487521243AD9740BEE0AC210AC290D45C8322E424B3E5EBF16 |
Windows6.1-KB2928120-x64.msu |
EA5332F4E289DC799611EAB8E3EE2E86B7880A4B |
417A2BA34F8FD367556812197E2395ED40D8B394F9224CDCBE8AB3939795EC2A |
Windows6.1-KB2928120-x86.msu |
7B7B6EE24CD8BE1AB3479F9E1CF9C98982C8BAB1 |
603206D44815EF2DC262016ED13D6569BE13D06E2C6029FB22621027788B8095 |
Windows8-RT-KB2928120-x64.msu |
E18FC05B4CCA0E195E62FF0AE534BA39511A8593 |
FCAED97BF1D61F60802D397350380FADED71AED64435D3E9EAA4C0468D80141E |
Windows8-RT-KB2928120-x86.msu |
A5DFB34F3B9EAD9FA78C67DFC7ACACFA2FBEAC0B |
7F00A72D8A15EB2CA70F7146A8014E39A71CFF5E39596F379ACD883239DABD41 |
Windows8.1-KB2928120-x64.msu |
A07FF14EED24F3241D508C50E869540915134BB4 |
6641B1A9C95A7E4F0D5A247B9F488887AC94550B7F1D7B1198D5BCBA92F7A753 |
Windows8.1-KB2928120-x86.msu |
DE84667EC79CBA2006892452660EB99580D27306 |
468EE4FA3A22DDE61D85FD3A9D0583F504105DF2F8256539051BC0B1EB713E9C |
Windows8.1-KB2961899-x64.msu |
10BAE807DB158978BCD5D8A7862BC6B3EF20038B |
EC26618E23D9278FC1F02CA1F13BB289E1C6C4E0C8DA5D22E1D9CDA0DA8AFF51 |
Windows8.1-KB2961899-x86.msu |
230C64447CC6E4AB3AD7B4D4655B8D8CEFBFBE98 |
E3FAD567AB6CA616E42873D3623A777185BE061232B952938A8846A974FFA7AF |