Platform
windows
Component
remote-desktop-client
Fixed in
1.2.6353.0
10.0.10240.21073
10.0.14393.8246
10.0.17763.7558
10.0.19044.6093
10.0.19045.6093
10.0.22621.5624
10.0.22631.5624
10.0.26100.4652
CVE-2025-48817 describes a Remote Code Execution (RCE) vulnerability within the Remote Desktop Client. This flaw stems from a relative path traversal issue, enabling an attacker to potentially execute arbitrary code over a network connection. The vulnerability impacts versions ranging from 1.2.0.0 through 10.0.26100.4652. A patch is available, resolving this critical security concern.
The impact of CVE-2025-48817 is significant due to its RCE nature. An attacker exploiting this vulnerability could gain complete control over the affected system, potentially leading to data theft, system compromise, and further lateral movement within the network. The relative path traversal allows attackers to manipulate file paths, potentially overwriting critical system files or executing malicious payloads. Successful exploitation could grant an attacker persistent access, enabling them to establish a foothold and exfiltrate sensitive information. This vulnerability shares similarities with other path traversal exploits, where attackers leverage improper input validation to access unauthorized resources.
CVE-2025-48817 was publicly disclosed on 2025-07-08. The EPSS score is pending evaluation. Currently, there are no publicly available proof-of-concept exploits, but the nature of the vulnerability suggests that one could be developed relatively easily. Monitor security advisories and threat intelligence feeds for any indications of active exploitation.
Exploit Status
EPSS
0.07% (20% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2025-48817 is to upgrade the Remote Desktop Client to version 10.0.26100.4652 or later. If immediate upgrading is not feasible, consider implementing network segmentation to limit the potential blast radius of a successful attack. While a direct workaround isn't available, restricting network access to the Remote Desktop Client service can reduce the attack surface. Monitor network traffic for unusual connections or file access attempts related to the Remote Desktop Client. After upgrading, verify the fix by attempting to access files outside the intended directory via the Remote Desktop Client – the operation should fail with an access denied error.
Actualice el cliente de Escritorio Remoto a la última versión disponible proporcionada por Microsoft. Esto se puede hacer a través de Windows Update o descargando la última versión desde el sitio web de Microsoft.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2025-48817 is a Remote Code Execution vulnerability in the Remote Desktop Client allowing attackers to execute code over a network. It has a CVSS score of 8.8 (HIGH).
You are affected if you are using Remote Desktop Client versions 1.2.0.0–10.0.26100.4652. Check your installed version against the affected range.
Upgrade to version 10.0.26100.4652 or later to resolve the vulnerability. If immediate upgrade isn't possible, implement network segmentation.
Currently, there are no confirmed reports of active exploitation, but the vulnerability's nature suggests potential for exploitation.
Refer to the official Microsoft Security Update Guide for CVE-2025-48817 when available.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.