Use after free in Remote Desktop Client allows an unauthorized attacker to execute code over a network.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 31 Oct 2025 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft windows 10 1507
Microsoft windows 10 1607
Microsoft windows 10 1809
Microsoft windows 10 21h2
Microsoft windows 10 22h2
Microsoft windows 11 22h2
Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows App
Microsoft windows Server 2022 23h2
CPEs cpe:2.3:a:microsoft:remote_desktop_client:*:*:*:*:*:windows:*:*
cpe:2.3:a:microsoft:windows_app:*:*:*:*:*:windows:*:*
cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_11_25h2:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*
Vendors & Products Microsoft windows 10 1507
Microsoft windows 10 1607
Microsoft windows 10 1809
Microsoft windows 10 21h2
Microsoft windows 10 22h2
Microsoft windows 11 22h2
Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows App
Microsoft windows Server 2022 23h2

Thu, 23 Oct 2025 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft
Microsoft remote
Microsoft remote Desktop
Microsoft remote Desktop Client
Microsoft windows
Microsoft windows 10
Microsoft windows 11
Microsoft windows Server
Microsoft windows Server 2008
Microsoft windows Server 2012
Microsoft windows Server 2016
Microsoft windows Server 2019
Microsoft windows Server 2022
Microsoft windows Server 2025
Vendors & Products Microsoft
Microsoft remote
Microsoft remote Desktop
Microsoft remote Desktop Client
Microsoft windows
Microsoft windows 10
Microsoft windows 11
Microsoft windows Server
Microsoft windows Server 2008
Microsoft windows Server 2012
Microsoft windows Server 2016
Microsoft windows Server 2019
Microsoft windows Server 2022
Microsoft windows Server 2025

Tue, 14 Oct 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 14 Oct 2025 17:15:00 +0000

Type Values Removed Values Added
Description Use after free in Remote Desktop Client allows an unauthorized attacker to execute code over a network.
Title Remote Desktop Client Remote Code Execution Vulnerability
Weaknesses CWE-416
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2025-11-04T20:03:19.906Z

Reserved: 2025-09-03T20:46:29.256Z

Link: CVE-2025-58718

cve-icon Vulnrichment

Updated: 2025-10-14T19:22:14.961Z

cve-icon NVD

Status : Analyzed

Published: 2025-10-14T17:15:53.100

Modified: 2025-10-31T15:20:17.787

Link: CVE-2025-58718

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-10-23T15:17:18Z