Remote Desktop Client Remote Code Execution Vulnerability
A use-after-free vulnerability in the Remote Desktop Client allows an attacker to execute code over a network. An attacker can send a specially crafted RDP message to trigger the flaw. If a user interacts with the RDP client (such as connecting to an attacker-controlled RDP server), the attacker can execute arbitrary code with the user's privileges. The vulnerability affects Remote Desktop Client on all supported Windows 10, Windows 11, and Windows Server 2016–2025 platforms (32-bit, x64, and ARM64 architectures).
- Network access to a Windows machine running Remote Desktop Client
- User must interact with the RDP client (e.g., accept a connection to a malicious RDP server or open a file)
- Target machine must be running a vulnerable version of Windows with RDP enabled
Patching may require device reboot — plan for process interruption
/api/v1/advisories/94a5550c-caf9-42d4-9e15-16cd25617da2Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.