CVE-2025-27482
vulnerability analysis and mitigation

Overview

CVE-2025-27482 is a critical Remote Code Execution (RCE) vulnerability discovered in the Windows Remote Desktop Gateway Service. The vulnerability was disclosed and patched on April 8, 2025, as part of Microsoft's April 2025 Patch Tuesday release. The vulnerability stems from sensitive data storage in improperly locked memory, which could allow an unauthorized attacker to execute code over a network (NVD, Tenable Blog).

Technical details

The vulnerability has been assigned a CVSSv3 score of 8.1 (HIGH) with the following vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H. To successfully exploit this vulnerability, an attacker must be able to win a race condition. Despite this requirement, Microsoft has assessed this vulnerability as 'Exploitation More Likely' according to their Exploitability Index (NVD, Tenable Blog).

Impact

If successfully exploited, this vulnerability allows an unauthorized attacker to execute arbitrary code over a network through the Remote Desktop Gateway Service. The high CVSS score indicates that successful exploitation could lead to significant compromise of system confidentiality, integrity, and availability (NVD).

Mitigation and workarounds

Microsoft has released security patches to address this vulnerability as part of their April 2025 Patch Tuesday update. Organizations are strongly advised to apply these security updates as soon as possible to protect against potential exploitation (Tenable Blog).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management