Article ID: 123505, created on Nov 12, 2014, last review on Nov 13, 2014

  • Applies to:
  • Plesk for Windows


Microsoft has revealed vulnerability in Microsoft Secure Channel (Schannel) security package in Windows. It affects all modern versions of Windows, including Windows Server 2003/2008/2012, Vista, 7, 8, 8.1, and Windows RT.

There aren't any known exploits that have actually used this vulnerability yet, however it is highly recommended to install security patch. Please refer to Microsoft TechNet article for details:

MS14-066 - Vulnerability in Schannel Could Allow Remote Code Execution (2992611)


The vulnerability could allow remote code execution if an attacker sends specially crafted packets to a Windows server. According to Microsoft security bulletin at the time it was issued, there was no information to indicate that this vulnerability had been publicly used to attack customers.

This security update is rated Critical for all supported releases of Microsoft Windows.


  1. Please check the network adapter installed in system. If it is "Parallels Virtual Network Adapter", then you are inside Parallels Virtuozzo Container; please proceed with the instructions from the corresponding article. Otherwise, please proceed with step 2.

  2. To close the vulnerability on physical hosts and virtual machines simply install the security patch from Windows Update. If you are not the owner of the physical host, contact the service provider with the request to have the vulnerability closed.

85a92ca67f2200d36506862eaa6ed6b8 56797cefb1efc9130f7c48a7d1db0f0c a914db3fdc7a53ddcfd1b2db8f5a1b9c

Email subscription for changes to this article
Save as PDF