Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2025-29966

Опубликовано: 13 мая 2025
Источник: msrc
CVSS3: 8.8
EPSS Низкий

Описание

Remote Desktop Client Remote Code Execution Vulnerability

Heap-based buffer overflow in Windows Remote Desktop allows an unauthorized attacker to execute code over a network.

FAQ

How could an attacker exploit this vulnerability?

In the case of a Remote Desktop connection, an attacker with control of a Remote Desktop Server could trigger a remote code execution (RCE) on the RDP client machine when a victim connects to the attackers server with the vulnerable Remote Desktop Client.

Обновления

ПродуктСтатьяОбновление
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2012
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 R2 (Server Core installation)
Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows Server 2016
Windows 10 Version 1607 for 32-bit Systems

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 36%
0.00147
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
около 1 месяца назад

Heap-based buffer overflow in Windows Remote Desktop allows an unauthorized attacker to execute code over a network.

CVSS3: 8.8
github
около 1 месяца назад

Heap-based buffer overflow in Windows Remote Desktop allows an unauthorized attacker to execute code over a network.

CVSS3: 8.8
fstec
около 1 месяца назад

Уязвимость клиента удаленного рабочего стола Remote Desktop Client операционных систем Windows, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 36%
0.00147
Низкий

8.8 High

CVSS3