Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Windows Remote Desktop Services Vulnerability Let Attacker Deny Services Over Network

Posted on August 13, 2025August 13, 2025 By CWS

Microsoft launched safety patches addressing a major vulnerability in Home windows Distant Desktop Providers that would permit unauthorized attackers to launch denial of service assaults over community connections. 

The vulnerability, designated as CVE-2025-53722, impacts a number of Home windows variations spanning from legacy techniques to the most recent Home windows Server 2025 and Home windows 11 24H2 releases.

Key Takeaways1. Essential Home windows RDS flaw lets distant attackers set off DoS.2. Community‑based mostly, low complexity assault vector.3.  Microsoft patched it on Aug 12, 2025.

Home windows RDP DoS Vulnerability

The vulnerability stems from uncontrolled useful resource consumption in Home windows Distant Desktop Providers, categorised beneath CWE-400 by the Widespread Weak spot Enumeration system. 

Safety researchers have assigned the flaw a CVSS 3.1 base rating of seven.5, indicating excessive severity with the potential for important system disruption. 

The assault vector presents significantly regarding traits, requiring no authentication or person interplay whereas sustaining low assault complexity.

The CVSS vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C reveals that attackers can exploit this vulnerability remotely over community connections with out requiring elevated privileges. 

Whereas the vulnerability doesn’t compromise knowledge confidentiality or integrity, it poses a excessive availability affect, doubtlessly rendering affected techniques utterly inaccessible by way of useful resource exhaustion assaults.

Erik Egsgard from Discipline Impact receives acknowledgment for locating and responsibly disclosing this vulnerability by way of coordinated disclosure processes. 

Microsoft’s exploitability evaluation at present charges the chance of exploitation as “Much less Seemingly,” although no public exploits or energetic assaults have been documented on the time of disclosure.

Threat FactorsDetailsAffected Merchandise– Home windows Server 2008 R2 (SP1)- Home windows Server 2012 / 2012 R2- Home windows Server 2016- Home windows Server 2019- Home windows Server 2022- Home windows Server 2025- Home windows 10 (variations 1607, 1809, 21H2, 22H2)- Home windows 11 (variations 22H2, 23H2, 24H2)ImpactDenial of Service (DoS)Exploit PrerequisitesNo authentication required, no person interplay, community‑based mostly assault, low complexity.CVSS 3.1 Score7.5 (Excessive)

Safety Updates

Microsoft has launched complete safety updates addressing CVE-2025-53722 throughout 33 totally different Home windows configurations, together with each commonplace installations and Server Core deployments. 

Essential patches embody KB5063880 and KB5063812 for Home windows Server 2022, KB5063878 and KB5064010 for Home windows Server 2025, and KB5063875 for Home windows 11 variations 22H2 and 23H2.

Legacy techniques obtain equal consideration, with patches KB5063947 and KB5063927 addressing Home windows Server 2008 R2 techniques, whereas KB5063950 covers Home windows Server 2012 R2 installations. 

Organizations working Home windows 10 techniques throughout numerous variations can apply KB5063709 for 21H2 and 22H2 releases, and KB5063871 for model 1607 techniques.

System directors ought to prioritize instant patch deployment, significantly in environments the place Distant Desktop Providers face exterior community publicity. 

The vulnerability’s network-based assault vector and low complexity necessities make unpatched techniques engaging targets for disruption campaigns concentrating on enterprise continuity and operational availability.

Enhance your SOC and assist your crew defend what you are promoting with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attacker, Deny, Desktop, Network, Remote, Services, Vulnerability, Windows

Post navigation

Previous Post: What the Next Wave of AI Cyberattacks Will Look Like — And How to Survive
Next Post: New Charon Ransomware Employs DLL Sideloading, and Anti-EDR Capabilities to Attack Organizations

Related Posts

10 Best ZTNA Solutions (Zero Trust Network Access) in 2025 Cyber Security News
Critical Zoom Clients for Windows Vulnerability Lets Attackers Escalate Privileges Cyber Security News
Detecting Lateral Movement in Windows-Based Network Infrastructures Cyber Security News
Samsung MagicINFO 9 Server Vulnerability Let Attackers Write Arbitrary File Cyber Security News
New JSCEAL Attack Targeting Crypto App Users To Steal Credentials and Wallets Cyber Security News
NOVABLIGHT as Educational Tool Attacking Users to Steal Login Credentials and Compromise Wallets Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Multiple GitLab Vulnerabilities Enables Account Takeover and Stored XSS Exploitation
  • How to Secure Your GitHub Repositories
  • CISA Added WinRaR Zero-Day (CVE-2025-8088) Vulnerability That is Actively Exploited In the Wild
  • Microsoft Removes PowerShell 2.0  from Windows To Clean up Legacy Code
  • Norwegian Police Say Pro-Russian Hackers Were Likely Behind Suspected Sabotage at a Dam

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Multiple GitLab Vulnerabilities Enables Account Takeover and Stored XSS Exploitation
  • How to Secure Your GitHub Repositories
  • CISA Added WinRaR Zero-Day (CVE-2025-8088) Vulnerability That is Actively Exploited In the Wild
  • Microsoft Removes PowerShell 2.0  from Windows To Clean up Legacy Code
  • Norwegian Police Say Pro-Russian Hackers Were Likely Behind Suspected Sabotage at a Dam

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News