Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2025-27487

Опубликовано: 08 апр. 2025
Источник: msrc
CVSS3: 8
EPSS Низкий

Описание

Remote Desktop Client Remote Code Execution Vulnerability

Heap-based buffer overflow in Remote Desktop Client allows an authorized attacker to execute code over a network.

FAQ

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

Exploitation of this vulnerability requires a user to remote into a server that is controlled by an attacker, which could then allow the server to execute a command on the user's machine without their consent. This scenario assumes that the user has the ability to remote into the server and that the server has been compromised to execute such commands upon connection.

How could an attacker exploit this vulnerability?

In the case of a Remote Desktop connection, an attacker with control of a Remote Desktop Server could trigger a remote code execution (RCE) on the machine when a victim connects to the attacking server with the vulnerable Remote Desktop Client.

Are the updates for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems currently available?

Yes. As of April 9, 2025, the security update (5055547) for Windows 10 for x64-based Systems and Windows 10 for 32-bit Systems are available. Customers running Windows 10 should ensure the update is installed to be protected from this vulnerability.

According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.

Обновления

ПродуктСтатьяОбновление
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2012
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 R2 (Server Core installation)
Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows Server 2016
Windows 10 Version 1607 for 32-bit Systems

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 62%
0.00446
Низкий

8 High

CVSS3

Связанные уязвимости

CVSS3: 8
nvd
2 месяца назад

Heap-based buffer overflow in Remote Desktop Client allows an authorized attacker to execute code over a network.

CVSS3: 8
github
2 месяца назад

Heap-based buffer overflow in Remote Desktop Client allows an authorized attacker to execute code over a network.

CVSS3: 8
fstec
2 месяца назад

Уязвимость клиента удаленного рабочего стола Remote Desktop Client операционных систем Windows, связанная с переполнением буфера в динамической памяти, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 62%
0.00446
Низкий

8 High

CVSS3