Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Windows Remote Desktop Vulnerability Let Attackers Execute Malicious Code Over Network

Windows Remote Desktop Vulnerability Let Attackers Execute Malicious Code Over Network

Posted on May 14, 2025May 14, 2025 By CWS

Microsoft’s Could 2025 Patch Tuesday has addressed a number of essential vulnerabilities in Home windows Distant Desktop providers that might enable attackers to execute malicious code remotely. Safety consultants are urging customers to use these patches instantly to safeguard their techniques towards potential exploits.

Among the many 72 flaws mounted on this month’s safety replace, two essential Distant Desktop vulnerabilities stand out as notably regarding. CVE-2025-29966 and CVE-2025-29967 each contain heap-based buffer overflow vulnerabilities within the Distant Desktop Shopper and Gateway Service, respectively, permitting unauthorized attackers to execute arbitrary code over a community.

“Within the case of a Distant Desktop connection, an attacker with management of a Distant Desktop Server may set off a distant code execution on the RDP shopper machine when a sufferer connects to the attacker’s server with the susceptible Distant Desktop Shopper,” Microsoft defined in its safety advisory.

These vulnerabilities obtained “Vital” severity rankings with a excessive CVSS rating, indicating their potential affect on affected techniques. The failings particularly exploit weaknesses categorised underneath CWE-122: Heap-based Buffer Overflow, permitting attackers to deprave reminiscence in a method that allows code execution.

Huge Vary of Programs Affected

The vulnerabilities affect a number of variations of Home windows working techniques that make the most of Distant Desktop providers. Whereas Microsoft has not but reported energetic exploitation of those particular flaws within the wild, the corporate has categorised them with an “Exploitation Much less Seemingly” evaluation for now.

“Though these specific vulnerabilities haven’t been exploited but, related Distant Desktop flaws have been prime targets for attackers prior to now,” mentioned a cybersecurity researcher acquainted with the matter. “The potential for an unauthenticated attacker to realize distant code execution makes these vulnerabilities particularly harmful.”

These Distant Desktop vulnerabilities have been amongst 72 flaws addressed in Microsoft’s Could Patch Tuesday, which additionally mounted 5 actively exploited zero-day vulnerabilities, together with points in Home windows DWM Core Library, Home windows Frequent Log File System Driver, and Home windows Ancillary Operate Driver for WinSock.

Safety consultants advocate that organizations and particular person customers apply these patches instantly. The vulnerability might be exploited when customers connect with malicious Distant Desktop servers, placing shopper machines prone to full system compromise.

For techniques that can’t be instantly patched, consultants counsel limiting Distant Desktop connections to trusted servers solely and implementing further community safety measures to limit potential assault vectors.

The Could 2025 safety updates can be found by way of Home windows Replace, Home windows Server Replace Providers (WSUS), and the Microsoft Replace Catalog.

Vulnerability Assault Simulation on How Hackers Quickly Probe Web sites for Entry Factors – Free Webinar

Cyber Security News Tags:Attackers, Code, Desktop, Execute, Malicious, Network, Remote, Vulnerability, Windows

Post navigation

Previous Post: How to Identify and Stop a Ransomware Attack
Next Post: Ivanti Patches EPMM Vulnerabilities Exploited for Remote Code Execution in Limited Attacks

Related Posts

Microsoft’s Plan to Phase Out NTLM for Enhanced Security Microsoft’s Plan to Phase Out NTLM for Enhanced Security Cyber Security News
10-Year-Old Roundcube RCE Vulnerability Let Attackers Execute Malicious Code 10-Year-Old Roundcube RCE Vulnerability Let Attackers Execute Malicious Code Cyber Security News
Hackers Exploit Windows File Explorer for Malware Delivery Hackers Exploit Windows File Explorer for Malware Delivery Cyber Security News
Lenovo IdeaCentre and Yoga Laptop BIOS Vulnerabilities Execute Arbitrary Code Lenovo IdeaCentre and Yoga Laptop BIOS Vulnerabilities Execute Arbitrary Code Cyber Security News
RDP vs SSH Comparison – Features, Protocols, Security, And Use Cases RDP vs SSH Comparison – Features, Protocols, Security, And Use Cases Cyber Security News
Iranian Threat Actors Attacking U.S. Critical Infrastructure Including Water Systems Iranian Threat Actors Attacking U.S. Critical Infrastructure Including Water Systems Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark