Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Windows Remote Desktop Services Vulnerability Let Attacker Deny Services Over Network

Posted on August 13, 2025August 13, 2025 By CWS

Microsoft launched safety patches addressing a major vulnerability in Home windows Distant Desktop Providers that would permit unauthorized attackers to launch denial of service assaults over community connections. 

The vulnerability, designated as CVE-2025-53722, impacts a number of Home windows variations spanning from legacy techniques to the most recent Home windows Server 2025 and Home windows 11 24H2 releases.

Key Takeaways1. Essential Home windows RDS flaw lets distant attackers set off DoS.2. Community‑based mostly, low complexity assault vector.3.  Microsoft patched it on Aug 12, 2025.

Home windows RDP DoS Vulnerability

The vulnerability stems from uncontrolled useful resource consumption in Home windows Distant Desktop Providers, categorised beneath CWE-400 by the Widespread Weak spot Enumeration system. 

Safety researchers have assigned the flaw a CVSS 3.1 base rating of seven.5, indicating excessive severity with the potential for important system disruption. 

The assault vector presents significantly regarding traits, requiring no authentication or person interplay whereas sustaining low assault complexity.

The CVSS vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C reveals that attackers can exploit this vulnerability remotely over community connections with out requiring elevated privileges. 

Whereas the vulnerability doesn’t compromise knowledge confidentiality or integrity, it poses a excessive availability affect, doubtlessly rendering affected techniques utterly inaccessible by way of useful resource exhaustion assaults.

Erik Egsgard from Discipline Impact receives acknowledgment for locating and responsibly disclosing this vulnerability by way of coordinated disclosure processes. 

Microsoft’s exploitability evaluation at present charges the chance of exploitation as “Much less Seemingly,” although no public exploits or energetic assaults have been documented on the time of disclosure.

Threat FactorsDetailsAffected Merchandise– Home windows Server 2008 R2 (SP1)- Home windows Server 2012 / 2012 R2- Home windows Server 2016- Home windows Server 2019- Home windows Server 2022- Home windows Server 2025- Home windows 10 (variations 1607, 1809, 21H2, 22H2)- Home windows 11 (variations 22H2, 23H2, 24H2)ImpactDenial of Service (DoS)Exploit PrerequisitesNo authentication required, no person interplay, community‑based mostly assault, low complexity.CVSS 3.1 Score7.5 (Excessive)

Safety Updates

Microsoft has launched complete safety updates addressing CVE-2025-53722 throughout 33 totally different Home windows configurations, together with each commonplace installations and Server Core deployments. 

Essential patches embody KB5063880 and KB5063812 for Home windows Server 2022, KB5063878 and KB5064010 for Home windows Server 2025, and KB5063875 for Home windows 11 variations 22H2 and 23H2.

Legacy techniques obtain equal consideration, with patches KB5063947 and KB5063927 addressing Home windows Server 2008 R2 techniques, whereas KB5063950 covers Home windows Server 2012 R2 installations. 

Organizations working Home windows 10 techniques throughout numerous variations can apply KB5063709 for 21H2 and 22H2 releases, and KB5063871 for model 1607 techniques.

System directors ought to prioritize instant patch deployment, significantly in environments the place Distant Desktop Providers face exterior community publicity. 

The vulnerability’s network-based assault vector and low complexity necessities make unpatched techniques engaging targets for disruption campaigns concentrating on enterprise continuity and operational availability.

Enhance your SOC and assist your crew defend what you are promoting with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attacker, Deny, Desktop, Network, Remote, Services, Vulnerability, Windows

Post navigation

Previous Post: What the Next Wave of AI Cyberattacks Will Look Like — And How to Survive
Next Post: New Charon Ransomware Employs DLL Sideloading, and Anti-EDR Capabilities to Attack Organizations

Related Posts

Google Announces That Android’s pKVM Framework Achieves SESIP Level 5 Certification Cyber Security News
Lenovo Protection Driver Vulnerability Let Attackers Escalate Privilege and Execute Arbitrary Code Cyber Security News
Hundreds of WordPress Websites Hacked By VexTrio Viper Group to Run Massive TDS Services Cyber Security News
FortiVoice 0-day Vulnerability Exploited in the Wild to Execute Arbitrary Code Cyber Security News
Windows Remote Desktop Gateway UAF Vulnerability Allows Remote Code Execution Cyber Security News
Federal IT contractor Agrees to Pay $14.75M Over False Cybersecurity Services Claim Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News