Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Windows Remote Desktop Vulnerability Let Attackers Execute Malicious Code Over Network

Posted on May 14, 2025May 14, 2025 By CWS

Microsoft’s Could 2025 Patch Tuesday has addressed a number of essential vulnerabilities in Home windows Distant Desktop providers that might enable attackers to execute malicious code remotely. Safety consultants are urging customers to use these patches instantly to safeguard their techniques towards potential exploits.

Among the many 72 flaws mounted on this month’s safety replace, two essential Distant Desktop vulnerabilities stand out as notably regarding. CVE-2025-29966 and CVE-2025-29967 each contain heap-based buffer overflow vulnerabilities within the Distant Desktop Shopper and Gateway Service, respectively, permitting unauthorized attackers to execute arbitrary code over a community.

“Within the case of a Distant Desktop connection, an attacker with management of a Distant Desktop Server may set off a distant code execution on the RDP shopper machine when a sufferer connects to the attacker’s server with the susceptible Distant Desktop Shopper,” Microsoft defined in its safety advisory.

These vulnerabilities obtained “Vital” severity rankings with a excessive CVSS rating, indicating their potential affect on affected techniques. The failings particularly exploit weaknesses categorised underneath CWE-122: Heap-based Buffer Overflow, permitting attackers to deprave reminiscence in a method that allows code execution.

Huge Vary of Programs Affected

The vulnerabilities affect a number of variations of Home windows working techniques that make the most of Distant Desktop providers. Whereas Microsoft has not but reported energetic exploitation of those particular flaws within the wild, the corporate has categorised them with an “Exploitation Much less Seemingly” evaluation for now.

“Though these specific vulnerabilities haven’t been exploited but, related Distant Desktop flaws have been prime targets for attackers prior to now,” mentioned a cybersecurity researcher acquainted with the matter. “The potential for an unauthenticated attacker to realize distant code execution makes these vulnerabilities particularly harmful.”

These Distant Desktop vulnerabilities have been amongst 72 flaws addressed in Microsoft’s Could Patch Tuesday, which additionally mounted 5 actively exploited zero-day vulnerabilities, together with points in Home windows DWM Core Library, Home windows Frequent Log File System Driver, and Home windows Ancillary Operate Driver for WinSock.

Safety consultants advocate that organizations and particular person customers apply these patches instantly. The vulnerability might be exploited when customers connect with malicious Distant Desktop servers, placing shopper machines prone to full system compromise.

For techniques that can’t be instantly patched, consultants counsel limiting Distant Desktop connections to trusted servers solely and implementing further community safety measures to limit potential assault vectors.

The Could 2025 safety updates can be found by way of Home windows Replace, Home windows Server Replace Providers (WSUS), and the Microsoft Replace Catalog.

Vulnerability Assault Simulation on How Hackers Quickly Probe Web sites for Entry Factors – Free Webinar

Cyber Security News Tags:Attackers, Code, Desktop, Execute, Malicious, Network, Remote, Vulnerability, Windows

Post navigation

Previous Post: How to Identify and Stop a Ransomware Attack
Next Post: Ivanti Patches EPMM Vulnerabilities Exploited for Remote Code Execution in Limited Attacks

Related Posts

PupkinStealer Attacks Windows System to Steal Login Credentials & Desktop Files Cyber Security News
Malware Defense 101 – Identifying and Removing Modern Threats Cyber Security News
FortiVoice 0-day Vulnerability Exploited in the Wild to Execute Arbitrary Code Cyber Security News
Windows Remote Desktop Gateway UAF Vulnerability Allows Remote Code Execution Cyber Security News
Printer Company Offered Malicious Drivers Infected With XRed Malware Cyber Security News
Recurring Supply‑Chain Lapses Expose UEFI Firmware to Pre‑OS Threats Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Printer Company Procolored Served Infected Software for Months
  • RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer
  • Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access
  • UK Legal Aid Agency Finds Data Breach Following Cyberattack
  • 480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2025

Recent Posts

  • Printer Company Procolored Served Infected Software for Months
  • RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer
  • Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access
  • UK Legal Aid Agency Finds Data Breach Following Cyberattack
  • 480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News