
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical security vulnerability (CVE-2025-48817) was discovered in Microsoft Remote Desktop Client that allows unauthorized attackers to execute code over a network through a relative path traversal weakness. The vulnerability was disclosed on July 8, 2025, affecting multiple versions of Windows operating systems from Server 2008 to Windows 11 24H2 (NVD, Cybersecurity News).
The vulnerability is classified with a CVSS v3.1 base score of 8.8 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. It combines a relative path traversal (CWE-23) with improper access control (CWE-284) in the Remote Desktop Client. The vulnerability affects Remote Desktop client versions prior to 1.2.6353.0 (NVD, Qualys).
Successful exploitation of this vulnerability enables attackers to execute arbitrary code with elevated privileges on affected systems. The attack vector is particularly concerning as it reverses the typical client-server security model, allowing compromised servers to attack connecting clients (Cybersecurity News).
Microsoft has released comprehensive security updates addressing CVE-2025-48817 across its entire Windows ecosystem. Organizations should prioritize applying security updates KB5062553 and KB5062552, as well as related patches corresponding to their specific Windows versions. The Remote Desktop client should be updated to version 1.2.6353.0 or later (Qualys).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."