More Info:

Ensure that Microsoft Azure network security groups (NSGs) do not allow unrestricted access (i.e. 0.0.0.0/0) on TCP port 135 in order to implement the principle of least privilege and effectively reduce the attack surface. Remote Procedure Call (RPC) TCP port 135 is used for client-server communications by Microsoft Message Queuing (MSMQ) as well as other Microsoft Windows/Windows Server software.

Risk Level

High

Address

Security

Compliance Standards

SOC2, GDPR, ISO27001, HIPAA, HITRUST, NISTCSF, PCIDSS, FedRAMP

Triage and Remediation

Remediation

To remediate the “Unrestricted RPC Access” misconfiguration in Azure using the Azure Console, you can follow these steps:

  1. Log in to the Azure portal (https://portal.azure.com/).

  2. Navigate to the virtual machine that has the misconfiguration.

  3. Click on the “Networking” tab in the left-hand menu.

  4. Under “Inbound port rules”, click on “Add inbound port rule”.

  5. In the “Add inbound security rule” dialog box, fill in the following information:

  • Name: A unique name for the rule (e.g., “RPC Access Restricted”).
  • Priority: A number that determines the order in which the rule is applied (e.g., 100).
  • Protocol: Select “TCP”.
  • Port range: Enter “135-139, 445”.
  • Action: Select “Deny”.
  • Source: Select “Any”.
  1. Click “Add” to create the new rule.

  2. Repeat steps 4-6 for any other virtual machines that have the same misconfiguration.

By following these steps, you will have restricted RPC access to the virtual machine, which will help mitigate the risk of unauthorized access.