Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Windows Remote Desktop Gateway UAF Vulnerability Allows Remote Code Execution

Windows Remote Desktop Gateway UAF Vulnerability Allows Remote Code Execution

Posted on May 19, 2025May 19, 2025 By CWS

A important vulnerability in Microsoft’s Distant Desktop Gateway (RD Gateway) that might permit attackers to execute malicious code on affected methods remotely.

The vulnerability, tracked as CVE-2025-21297, was disclosed by Microsoft of their January 2025 safety updates and has since been actively exploited within the wild.

The flaw, found and reported by VictorV (Tang Tianwen) from Kunlun Lab, stems from a use-after-free (UAF) bug triggered by concurrent socket connections throughout the initialization of the Distant Desktop Gateway service.

Particularly, the vulnerability exists within the aaedge.dll library, throughout the CTsgMsgServer::GetCTsgMsgServerInstance operate, the place a world pointer (m_pMsgSvrInstance) is initialized with out correct thread synchronization.

“The vulnerability happens when a number of threads can overwrite the identical world pointer, corrupting reference counts and finally resulting in the dereferencing of a dangling pointer – a traditional UAF situation,” explains the safety advisory.

The race situation permits attackers to use a timing challenge the place reminiscence allocation and pointer task happen out of sync, doubtlessly resulting in arbitrary code execution. Microsoft has assigned the vulnerability a CVSS rating of 8.1, indicating excessive severity.

Home windows Distant Desktop Gateway UAF Vulnerability

In response to researchers, profitable exploitation requires an attacker to:

Connect with a system working the RD Gateway function.

Set off concurrent connections to the RD Gateway (through a number of sockets).

Exploit the timing challenge the place reminiscence allocation and pointer task happen out of sync.

Trigger one connection to overwrite the pointer earlier than one other finishes referencing it.

The exploit entails a nine-step timeline of heap collisions between threads, resulting in eventual use of a freed reminiscence block, opening the door for arbitrary code execution.

A number of variations of Home windows Server that make the most of RD Gateway for safe distant entry are susceptible, together with:

Home windows Server 2016 (Core and Commonplace installations).

Home windows Server 2019 (Core and Commonplace installations).

Home windows Server 2022 (Core and Commonplace installations).

Home windows Server 2025 (Core and Commonplace installations).

Organizations utilizing RD Gateway as a important entry level for workers, contractors, or companions working remotely are notably in danger.

Microsoft addressed the vulnerability in Might 2025 Patch Tuesday by introducing mutex-based synchronization, guaranteeing that just one thread can initialize the worldwide occasion at any given time. The next safety updates can be found:

Home windows Server 2016: Replace KB5050011.

Home windows Server 2019: Replace KB5050008 (Construct 10.0.17763.6775).

Home windows Server 2022: Replace KB5049983 (Construct 10.0.20348.3091).

Home windows Server 2025: Replace KB5050009 (Construct 10.0.26100.2894).

Safety specialists strongly urge organizations to use these patches instantly. “This vulnerability represents a important danger to enterprise environments that depend on Distant Desktop Gateway for safe distant entry,” famous a safety researcher conversant in the difficulty.

Till patches will be utilized, organizations are suggested to observe RD Gateway logs for uncommon exercise and contemplate implementing network-level protections to restrict incoming connections to trusted sources.

Vulnerability Assault Simulation on How Hackers Quickly Probe Web sites for Entry Factors – Free Webinar

Cyber Security News Tags:Code, Desktop, Execution, Gateway, Remote, UAF, Vulnerability, Windows

Post navigation

Previous Post: How to Recognize and Block Spyware
Next Post: Abusing dMSA with Advanced Active Directory Persistence Techniques 

Related Posts

North Korean Hackers Using Fake Zoom Invites to Attack Crypto Startups North Korean Hackers Using Fake Zoom Invites to Attack Crypto Startups Cyber Security News
UTG-Q-1000 Group Weaponizing Subsidy Schemes to Exfiltrate Sensitive Data UTG-Q-1000 Group Weaponizing Subsidy Schemes to Exfiltrate Sensitive Data Cyber Security News
Chinese Hackers Leverage Geo-Mapping Tool to Maintain Year-Long Persistence Chinese Hackers Leverage Geo-Mapping Tool to Maintain Year-Long Persistence Cyber Security News
Critical Cisco Firewall Vulnerability Requires Immediate Fix Critical Cisco Firewall Vulnerability Requires Immediate Fix Cyber Security News
ChatGPT Atlas Stores OAuth Tokens Unencrypted Leads to Unauthorized Access to User Accounts ChatGPT Atlas Stores OAuth Tokens Unencrypted Leads to Unauthorized Access to User Accounts Cyber Security News
Sidewinder Hacker Group Weaponizing LNK File to Execute Malicious Scripts Sidewinder Hacker Group Weaponizing LNK File to Execute Malicious Scripts Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark