Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Windows Remote Desktop Services Vulnerability Let Attackers Escalate Privileges

Windows Remote Desktop Services Vulnerability Let Attackers Escalate Privileges

Posted on November 12, 2025November 12, 2025 By CWS

Microsoft has disclosed a big vulnerability in Home windows Distant Desktop Companies (RDS) that might enable licensed attackers to escalate their privileges on affected methods.

Tracked as CVE-2025-60703, the flaw stems from an untrusted pointer dereference, a traditional reminiscence security concern that has plagued software program for years, and carries an “Vital” severity score from the corporate.

The vulnerability impacts the core of Home windows RDS, a broadly used protocol for distant entry to Home windows machines. In accordance with Microsoft’s advisory, a licensed native attacker may exploit this weak spot to realize elevated privileges, doubtlessly reaching SYSTEM-level entry.

This implies a person with normal credentials on a compromised machine may bypass safety controls and execute arbitrary code with administrative rights.

Whereas the problem requires native authentication, it poses a severe danger in multi-user environments, resembling enterprise networks or shared servers, the place insider threats or preliminary footholds (like via phishing) are frequent.

Technically, CVE-2025-60703 falls below CWE-822: Untrusted Pointer Dereference, the place the software program fails to validate a pointer earlier than dereferencing it, resulting in potential reminiscence corruption.

Microsoft classifies the exploitability as “Unlikely” at this stage, with no public disclosure or proof of lively exploitation. The CVSS rating, sourced instantly from Microsoft, underscores its significance with out escalating to Vital standing, seemingly because of the native assault vector.

Affected variations span a number of Home windows releases, together with Home windows 10, 11, and Server editions with RDS enabled elements integral to distant work setups post-pandemic.

ProductAffected VersionsPatched By (KB/Replace)Home windows Server 2012 R2All variations earlier than November 2025 ESUKB5068905 (November 2025 safety replace)Home windows Server 2008All variations earlier than November 2025 ESUNovember 2025 ESU safety updateWindows Server 2008 R2All ESU-eligible variations earlier than updateNovember 2025 ESU cumulative updateWindows 7 ESUAll ESU-eligible variations earlier than updateNovember 2025 ESU cumulative updateWindows 8.1 ESUAll ESU-eligible variations earlier than updateNovember 2025 ESU cumulative replace

Microsoft urges quick patching, with updates rolled out by way of Home windows Replace. Organizations counting on RDS for digital desktop infrastructure (VDI) or distant administration ought to prioritize deployment.

As an added precaution, consultants advocate implementing least-privilege ideas, monitoring for uncommon privilege escalations, and segmenting networks to restrict lateral motion.

This disclosure comes amid a surge in Home windows-targeted threats, together with latest zero-day vulnerabilities in different Microsoft merchandise. Whereas not but weaponized, CVE-2025-60703 serves as a reminder of the enduring challenges in securing distant entry protocols.

Safety groups are suggested to evaluation Microsoft’s full advisory and check patches in staging environments to keep away from disruptions.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attackers, Desktop, Escalate, Privileges, Remote, Services, Vulnerability, Windows

Post navigation

Previous Post: Chrome Patches High-severity Implementation Vulnerability in V8 JavaScript engine
Next Post: New Phishing Attack Targeting Meta Business Suite Users to Steal Login Credentials

Related Posts

Threat Actors Advertising Anivia Stealer Malware on Dark Web Bypassing UAC Controls Threat Actors Advertising Anivia Stealer Malware on Dark Web Bypassing UAC Controls Cyber Security News
New Forensic Technique Uncovers Hidden Trails Left by Hackers Exploiting RDP New Forensic Technique Uncovers Hidden Trails Left by Hackers Exploiting RDP Cyber Security News
Users Report Teams and Access Issues Users Report Teams and Access Issues Cyber Security News
New Gmail Phishing Attack With Weaponized Login Flow Steals Login Credentials New Gmail Phishing Attack With Weaponized Login Flow Steals Login Credentials Cyber Security News
ChoiceJacking Attack Lets Hackers Compromise Android & iOS Devices via Malicious Charger ChoiceJacking Attack Lets Hackers Compromise Android & iOS Devices via Malicious Charger Cyber Security News
French Football Federation Reports Data Breach French Football Federation Reports Data Breach Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News