Article ID: 123504, created on Nov 12, 2014, last review on Nov 19, 2014

  • Applies to:
  • Operations Automation
  • Business Automation


Microsoft has revealed vulnerability in Microsoft Secure Channel (Schannel) security package in Windows. It affects all modern versions of Windows, including Windows Server 2003/2008/2012, Vista, 7, 8, 8.1, and Windows RT.

There aren't any known exploits that have actually used this vulnerability yet, however it is highly recommended to install security patch. Please refer to Microsoft TechNet article for details:

MS14-066 - Vulnerability in Schannel Could Allow Remote Code Execution (2992611)


The vulnerability could allow remote code execution if an attacker sends specially crafted packets to a Windows server. According to Microsoft security bulletin at the time it was issued, there was no information to indicate that this vulnerability had been publicly used to attack customers.

This security update is rated Critical for all supported releases of Microsoft Windows.


  1. To close the vulnerability on Windows-based service nodes (including POA and PBA management nodes) install the security patch from Windows Update. In case no updates are available, check if required Service Pack is installed. Update your box, if it is not, using instructions provided in "Can Service Pack be installed on POA Management node?" article.

  2. If the service node is a Parallels Virtuozzo Containers hardware node, please proceed with the instructions from the corresponding article.

Search Words




5356b422f65bdad1c3e9edca5d74a1ae caea8340e2d186a540518d08602aa065 e12cea1d47a3125d335d68e6d4e15e07 198398b282069eaf2d94a6af87dcb3ff

Email subscription for changes to this article
Save as PDF