MAIN MENU
Devolutions Blog

Announcements, updates, and insights from Devolutions.

Security
Microsoft rdp vulnerability devolutions blog

Tech News : Serious vulnerability found in Microsoft Remote Desktop Client (CVE-2025-48817)

CVE-2025-48817 allows RCE via Microsoft’s RDP client. Exploitation needs only user interaction. No known attacks yet, but immediate patching is urged to prevent potential threats.

Photo of Patrick Pilotte Patrick Pilotte

A serious vulnerability has been found in Microsoft Remote Desktop Client. The vulnerability, which is designated as CVE-2025-48817, affects multiple versions of Windows and poses significant security risks for organizations that rely on Remote Desktop Protocol (RDP) connections.

Below we summarize the details that are currently available, including information on patches that were released by Microsoft on July 8.

About the vulnerability

CVE-2025-48817 is a relative path traversal vulnerability, which combines with unauthorized access control mechanisms within Microsoft’s Remote Desktop Client infrastructure.

When victims connect to a compromised server using vulnerable Remote Desktop Client software, attackers could escape folder boundaries and carry out arbitrary remote code execution (RCE).

This vulnerability does not require privileges for exploitation. However, it is still necessary for privileged users to interact with an attacker-controlled RDP endpoint.

According to Microsoft, there are no reports of this vulnerability being exploited in the wild, and there has been no discourse about it on security software vendor blogs, forums, social media, etc. This suggests — but certainly does not guarantee — that threat actors were unaware of the vulnerability prior to the public disclosure by Microsoft on July 8. If so, this gives affected organizations a small window to eliminate the flaw before threat actors take notice and start launching attacks.

CVSS & severity rating

CVE-2025-48817 has been assigned a CVSS score of 8.8, which classifies its severity as “high” (note that the 8.8 score is just 0.2 shy of the most serious “critical” classification). High severity vulnerabilities are deemed to pose a critical risk to systems and data, and require immediate attention and mitigation.

Impacted Products

The following Microsoft products are impacted by this vulnerability:

Attack path

An attack that exploits CVE-2025-48817 unfolds per the following stages:

Patches

On July 8, Microsoft released comprehensive security patches addressing CVE-2025-48817 across its entire Windows ecosystem. All updates are available in the Microsoft Security Response Center.

Affected organizations are urged to prioritize the application of two new security updates, KB5062553 and KB5062552, along with patches that correspond to their specific Windows versions.

Insight & advice from our Operations Security Specialist Patrick Pilotte:

The recently disclosed vulnerability CVE-2025-48817 in Microsoft’s Remote Desktop Client is a stark reminder of the inherent security risks tied to RDP usage in Windows environments. This high-severity flaw impacts a wide range of systems — from Windows Server 2008 to Windows 11 — and allows unauthenticated RCE when a user connects to a malicious RDP server.

Although Microsoft released patches on July 8, and there’s no known exploitation in the wild (yet), the attack path is disturbingly simple: trick a privileged user into initiating a remote desktop connection to a rogue server. This could happen through phishing, social engineering, or lateral movement techniques. Once the connection is established, the malicious server can exploit relative path traversal vulnerabilities to escape folder boundaries and execute arbitrary code on the client machine — no elevation of privilege required.

Mitigation Strategies & how Devolutions helps

At Devolutions, we believe in proactive, layered security that doesn’t burden teams with complexity. Here are some of the ways that we help organizations reduce their exposure to vulnerabilities like CVE-2025-48817:

Final Thoughts

CVE-2025-48817 isn’t the first RDP-related vulnerability — and, unfortunately, it certainly won’t be the last. But it does offer a valuable opportunity to reassess remote access controls. With Devolutions solutions in place, organizations can reduce their attack surface, monitor privileged activity, and enforce strong access governance — before threat actors take advantage of a newly-discovered flaw.

More from Security

Read more articles