Windows Remote Desktop Services Vulnerability Let Attacker Deny Services Over Network

Windows Remote Desktop Services Vulnerability Let Attacker Deny Services Over Network

Microsoft released security patches addressing a significant vulnerability in Windows Remote Desktop Services that could allow unauthorized attackers to launch denial of service attacks over network connections. 

The vulnerability, designated as CVE-2025-53722, affects multiple Windows versions spanning from legacy systems to the latest Windows Server 2025 and Windows 11 24H2 releases.

Key Takeaways
1. Critical Windows RDS flaw lets remote attackers trigger DoS.
2. Network‑based, low complexity attack vector.
3.  Microsoft patched it on Aug 12, 2025.

Windows RDP DoS Vulnerability

The vulnerability stems from uncontrolled resource consumption in Windows Remote Desktop Services, classified under CWE-400 by the Common Weakness Enumeration system. 

Google News

Security researchers have assigned the flaw a CVSS 3.1 base score of 7.5, indicating high severity with the potential for significant system disruption. 

The attack vector presents particularly concerning characteristics, requiring no authentication or user interaction while maintaining low attack complexity.

The CVSS vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C reveals that attackers can exploit this vulnerability remotely over network connections without requiring elevated privileges. 

While the vulnerability does not compromise data confidentiality or integrity, it poses a high availability impact, potentially rendering affected systems completely inaccessible through resource exhaustion attacks.

Erik Egsgard from Field Effect receives acknowledgment for discovering and responsibly disclosing this vulnerability through coordinated disclosure processes. 

Microsoft’s exploitability assessment currently rates the likelihood of exploitation as “Less Likely,” though no public exploits or active attacks have been documented at the time of disclosure.

Risk Factors Details
Affected Products – Windows Server 2008 R2 (SP1)- Windows Server 2012 / 2012 R2- Windows Server 2016- Windows Server 2019- Windows Server 2022- Windows Server 2025- Windows 10 (versions 1607, 1809, 21H2, 22H2)- Windows 11 (versions 22H2, 23H2, 24H2)
Impact Denial of Service (DoS)
Exploit Prerequisites No authentication required, no user interaction, network‑based attack, low complexity.
CVSS 3.1 Score 7.5 (High)

Security Updates

Microsoft has released comprehensive security updates addressing CVE-2025-53722 across 33 different Windows configurations, including both standard installations and Server Core deployments. 

Critical patches include KB5063880 and KB5063812 for Windows Server 2022, KB5063878 and KB5064010 for Windows Server 2025, and KB5063875 for Windows 11 versions 22H2 and 23H2.

Legacy systems receive equal attention, with patches KB5063947 and KB5063927 addressing Windows Server 2008 R2 systems, while KB5063950 covers Windows Server 2012 R2 installations. 

Organizations operating Windows 10 systems across various versions can apply KB5063709 for 21H2 and 22H2 releases, and KB5063871 for version 1607 systems.

System administrators should prioritize immediate patch deployment, particularly in environments where Remote Desktop Services face external network exposure. 

The vulnerability’s network-based attack vector and low complexity requirements make unpatched systems attractive targets for disruption campaigns targeting business continuity and operational availability.

Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.


Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.