Remote Desktop Spoofing Vulnerability
Windows Remote Desktop contains insufficient UI warning of dangerous operations, allowing an attacker to perform spoofing attacks over a network. An attacker could trick a user into connecting to a fraudulent Remote Desktop server without proper warning, potentially capturing credentials or gaining access to the user's workstation. The vulnerability affects Windows 10 (versions 1607, 1809, 21H2, 22H2), Windows 11 (versions 23H2, 24H2, 25H2, 26H1), Windows Server 2016, 2019, 2022, 2025 across 32-bit, x64, and ARM64 architectures.
- User must initiate a Remote Desktop connection to an attacker-controlled or network-compromised server
- User must not notice or cannot see the spoofing warning due to UI insufficiency
- Attacker must be on a network path or have positioned a rogue RDP server where the user might connect
Patching may require device reboot — plan for process interruption
/api/v1/advisories/020098e6-0cfb-441b-9d84-a31ef24d40a7Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.