Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Windows Remote Desktop Client Vulnerability Let Attackers Execute Remote Code

Posted on October 15, 2025October 15, 2025 By CWS

Microsoft has patched a crucial flaw in its Distant Desktop Shopper that might permit attackers to execute malicious code on victims’ techniques.

Disclosed on October 14, 2025, as CVE-2025-58718, the vulnerability stems from a use-after-free error, incomes an “Vital” severity score.

Whereas not but exploited within the wild, safety specialists warn that it poses a major danger to Home windows customers counting on distant entry instruments.

The flaw impacts the Distant Desktop Shopper, a core element for connecting to distant machines. An unauthorized attacker may leverage it over a community by tricking a person into connecting to a malicious RDP server.

Home windows Distant Desktop Shopper RCE Vulnerability

As soon as linked, the server exploits the use-after-free bug to run arbitrary code within the person’s context, probably resulting in full system compromise.

This requires person interplay, corresponding to clicking a phishing hyperlink or accepting a bogus connection, however calls for no privileges from the attacker.

The Widespread Vulnerability Scoring System (CVSS) charges it at 8.8 out of 10, highlighting excessive impacts on confidentiality, integrity, and availability.

MetricValueAttack VectorNetworkAttack ComplexityLowPrivileges RequiredNoneUser InteractionRequiredScopeUnchangedConfidentialityHighIntegrityHighAvailabilityHighExploit MaturityUnproven

Microsoft classifies exploitation as “much less probably” because of the want for port redirection, which is disabled by default.

Customers ought to apply the October 2025 Patch Tuesday updates instantly to mitigate dangers. Allow computerized updates and keep away from connecting to untrusted RDP servers.

For organizations, segmenting networks and coaching on phishing consciousness can additional scale back publicity. As distant work persists, this vulnerability underscores the continuing want for vigilant endpoint safety.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attackers, Client, Code, Desktop, Execute, Remote, Vulnerability, Windows

Post navigation

Previous Post: Chrome Use After Free Vulnerability Let Attackers Execute Arbitrary Code
Next Post: Hackers Target ICTBroadcast Servers via Cookie Exploit to Gain Remote Shell Access

Related Posts

GitHub Enhances NPM’s Security with Strict Authentication, Granular Tokens, and  Trusted Publishing Cyber Security News
WhatsApp, Chrome 0-Day, AI Ransomware, and Cyber Attacks Cyber Security News
Qualys Confirms Data Breach – Hackers Accessed Salesforce Data in Supply Chain Attack Cyber Security News
Pro-Russian Hackers Attacking Key Industries in Major Countries Around The World Cyber Security News
Hackers Use AI Platforms to Steal Microsoft 365 Credentials in Phishing Campaign Cyber Security News
FortiDDoS OS Command Injection Vulnerability Let Attackers Execute Unauthorized Commands Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ICS Patch Tuesday: Fixes Announced by Siemens, Schneider, Rockwell, ABB, Phoenix Contact
  • Windows 11 And Server 2025 Will Start Caching Plaintext Credentials By Enabling WDigest Authentication
  • Windows Agere Modem Driver 0-Day Vulnerabilities Actively Exploited To Escalate Privileges
  • Two New Windows Zero-Days Exploited in the Wild — One Affects Every Version Ever Shipped
  • High-Severity Vulnerabilities Patched by Fortinet and Ivanti

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ICS Patch Tuesday: Fixes Announced by Siemens, Schneider, Rockwell, ABB, Phoenix Contact
  • Windows 11 And Server 2025 Will Start Caching Plaintext Credentials By Enabling WDigest Authentication
  • Windows Agere Modem Driver 0-Day Vulnerabilities Actively Exploited To Escalate Privileges
  • Two New Windows Zero-Days Exploited in the Wild — One Affects Every Version Ever Shipped
  • High-Severity Vulnerabilities Patched by Fortinet and Ivanti

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News