Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Windows Remote Desktop Services Vulnerability Let Attackers Escalate Privileges

Posted on November 12, 2025November 12, 2025 By CWS

Microsoft has disclosed a big vulnerability in Home windows Distant Desktop Companies (RDS) that might enable licensed attackers to escalate their privileges on affected methods.

Tracked as CVE-2025-60703, the flaw stems from an untrusted pointer dereference, a traditional reminiscence security concern that has plagued software program for years, and carries an “Vital” severity score from the corporate.

The vulnerability impacts the core of Home windows RDS, a broadly used protocol for distant entry to Home windows machines. In accordance with Microsoft’s advisory, a licensed native attacker may exploit this weak spot to realize elevated privileges, doubtlessly reaching SYSTEM-level entry.

This implies a person with normal credentials on a compromised machine may bypass safety controls and execute arbitrary code with administrative rights.

Whereas the problem requires native authentication, it poses a severe danger in multi-user environments, resembling enterprise networks or shared servers, the place insider threats or preliminary footholds (like via phishing) are frequent.

Technically, CVE-2025-60703 falls below CWE-822: Untrusted Pointer Dereference, the place the software program fails to validate a pointer earlier than dereferencing it, resulting in potential reminiscence corruption.

Microsoft classifies the exploitability as “Unlikely” at this stage, with no public disclosure or proof of lively exploitation. The CVSS rating, sourced instantly from Microsoft, underscores its significance with out escalating to Vital standing, seemingly because of the native assault vector.

Affected variations span a number of Home windows releases, together with Home windows 10, 11, and Server editions with RDS enabled elements integral to distant work setups post-pandemic.

ProductAffected VersionsPatched By (KB/Replace)Home windows Server 2012 R2All variations earlier than November 2025 ESUKB5068905 (November 2025 safety replace)Home windows Server 2008All variations earlier than November 2025 ESUNovember 2025 ESU safety updateWindows Server 2008 R2All ESU-eligible variations earlier than updateNovember 2025 ESU cumulative updateWindows 7 ESUAll ESU-eligible variations earlier than updateNovember 2025 ESU cumulative updateWindows 8.1 ESUAll ESU-eligible variations earlier than updateNovember 2025 ESU cumulative replace

Microsoft urges quick patching, with updates rolled out by way of Home windows Replace. Organizations counting on RDS for digital desktop infrastructure (VDI) or distant administration ought to prioritize deployment.

As an added precaution, consultants advocate implementing least-privilege ideas, monitoring for uncommon privilege escalations, and segmenting networks to restrict lateral motion.

This disclosure comes amid a surge in Home windows-targeted threats, together with latest zero-day vulnerabilities in different Microsoft merchandise. Whereas not but weaponized, CVE-2025-60703 serves as a reminder of the enduring challenges in securing distant entry protocols.

Safety groups are suggested to evaluation Microsoft’s full advisory and check patches in staging environments to keep away from disruptions.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attackers, Desktop, Escalate, Privileges, Remote, Services, Vulnerability, Windows

Post navigation

Previous Post: Chrome Patches High-severity Implementation Vulnerability in V8 JavaScript engine
Next Post: New Phishing Attack Targeting Meta Business Suite Users to Steal Login Credentials

Related Posts

New Windows-Based Airstalk Malware Employs Multi-Threaded C2 Communication to Steal Logins Cyber Security News
Sidewinder Hacker Group Weaponizing LNK File to Execute Malicious Scripts Cyber Security News
Beware of Malicious Steam Cleanup Tool Attack Windows Machines to Deploy Backdoor Malware Cyber Security News
Synology BeeStation 0-Day Vulnerability Let Remote Attackers Execute Arbitrary Code Cyber Security News
Best MSP Software: The Essential Tech Stack  Cyber Security News
Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: Deepwatch Layoffs, macOS Vulnerability, Amazon AI Bug Bounty
  • Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks
  • Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets
  • NVIDIA NeMo Framework Vulnerabilities Allows Code Injection and Privilege Escalation
  • SmartApeSG Campaign Leverages ClickFix Technique to Deploy NetSupport RAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: Deepwatch Layoffs, macOS Vulnerability, Amazon AI Bug Bounty
  • Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks
  • Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets
  • NVIDIA NeMo Framework Vulnerabilities Allows Code Injection and Privilege Escalation
  • SmartApeSG Campaign Leverages ClickFix Technique to Deploy NetSupport RAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News