Wednesday, May 14, 2025
Advertisements

Windows Remote Desktop Vulnerability Lets Attackers Execute Malicious Code Over Network

by Charline

Microsoft’s May 2025 Patch Tuesday update addressed several critical vulnerabilities in Windows Remote Desktop services, which could allow attackers to execute malicious code remotely. Experts are urging users to apply these patches as soon as possible to protect their systems from potential exploits.

Critical Remote Desktop Vulnerabilities Identified

Among the 72 flaws fixed in this month’s security update, two stand out as particularly concerning. CVE-2025-29966 and CVE-2025-29967 both involve heap-based buffer overflow vulnerabilities in the Remote Desktop Client and Gateway Service, respectively. These flaws allow unauthorized attackers to execute arbitrary code over a network.

Advertisements

“In the case of a Remote Desktop connection, an attacker with control of a Remote Desktop Server could trigger a remote code execution on the RDP client machine when a victim connects to the attacker’s server using the vulnerable Remote Desktop Client,” Microsoft explained in its security advisory.

Advertisements

Vulnerabilities With Critical Severity

These vulnerabilities have been assigned a Critical severity rating with a high CVSS score, highlighting their potential to affect vulnerable systems. The flaws exploit weaknesses under CWE-122: Heap-based Buffer Overflow, allowing attackers to corrupt memory and execute arbitrary code.

Advertisements

Wide Range of Systems Affected

The vulnerabilities impact multiple versions of Windows operating systems that utilize Remote Desktop services. Although Microsoft has not reported any active exploitation of these flaws, they have classified them as “Exploitation Less Likely” for now.

Advertisements

“Although these particular vulnerabilities haven’t been exploited yet, similar Remote Desktop flaws have been prime targets for attackers in the past,” said a cybersecurity researcher familiar with the matter. “The potential for an unauthenticated attacker to gain remote code execution makes these vulnerabilities especially dangerous.”

May 2025 Patch Tuesday Addresses Multiple Issues

These Remote Desktop vulnerabilities were part of the 72 flaws addressed in Microsoft’s May Patch Tuesday. The update also resolved five actively exploited zero-day vulnerabilities, including issues in the Windows DWM Core Library, Windows Common Log File System Driver, and Windows Ancillary Function Driver for WinSock.

Immediate Action Recommended

Security experts recommend that both organizations and individual users apply the patches immediately. The vulnerabilities can be exploited when users connect to malicious Remote Desktop servers, potentially putting their systems at risk of complete compromise.

For systems unable to patch immediately, experts suggest limiting Remote Desktop connections to trusted servers and implementing additional network security measures to mitigate potential attack vectors.

The May 2025 security updates are available through Windows Update, Windows Server Update Services (WSUS), and the Microsoft Update Catalog.

Advertisements

You may also like

blank

At ProxyServerPro, we are dedicated to providing cutting-edge proxy solutions tailored to meet the diverse needs of businesses and individuals. Our platform offers a comprehensive range of high-performance proxies, including residential, datacenter, and mobile options, ensuring seamless browsing, data scraping, and online anonymity. With a focus on reliability, speed, and security, we empower users to navigate the digital landscape with confidence. Whether you’re managing ad verification, market research, or web automation, ProxyServerPro is your trusted partner for scalable, efficient, and secure proxy services. Explore our portal to discover how we can elevate your online experience.

© 2024 Copyright  proxyserverpro.com