Vulnerable to unauthorised access and privilege escalation.
Susceptible to buffer overflow and DoS attacks.
May expose sensitive information if improperly configured.
Restrict RPC access to trusted hosts and networks.
Regularly patch and update RPC services.
Use firewalls to control RPC traffic.
High CPU utilisation on RPC services.
Unusual port activity related to RPC endpoints.
Suspicious access attempts or logs indicating exploitation.