Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2025-62220

Опубликовано: 11 нояб. 2025
Источник: msrc
CVSS3: 8.8
EPSS Низкий

Описание

Windows Subsystem for Linux GUI Remote Code Execution Vulnerability

Heap-based buffer overflow in Windows Subsystem for Linux GUI allows an unauthorized attacker to execute code over a network.

FAQ

Where do I find installation steps for WSL and WSLg?

If you have an existing WSL installation without WSLg and want to update to the latest version of WSL which includes WSLg, run the command wsl --update from an elevated command prompt.

To learn more visit the GitHub Repo.

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). How could an attacker exploit this vulnerability?

A vulnerability in the Remote Desktop client can lead to remote code execution in the Windows host process (msrdc.exe). While the typical scenario involves local communication between a Windows host and a Linux VM, the attack vector is Network (AV:N) because it relies on a network protocol.

Although user interaction is required, the risk extends beyond local use: the client supports loading plugins via the /plugin option, and the protocol is open source. This means a crafted attack could potentially be delivered remotely if an attacker can interact with the protocol.

Обновления

ПродуктСтатьяОбновление
Windows Subsystem for Linux GUI

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Unlikely

EPSS

Процентиль: 24%
0.00083
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
3 месяца назад

Heap-based buffer overflow in Windows Subsystem for Linux GUI allows an unauthorized attacker to execute code over a network.

CVSS3: 8.8
github
3 месяца назад

Heap-based buffer overflow in Windows Subsystem for Linux GUI allows an unauthorized attacker to execute code over a network.

CVSS3: 8.8
fstec
3 месяца назад

Уязвимость подсистемы совместимости для запуска Linux-приложений Windows Subsystem for Linux GUI (WSLg), связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 24%
0.00083
Низкий

8.8 High

CVSS3