Microsoft releases emergency patch for CVE-2025-71229, a critical remote code execution flaw affecting Windows systems. Users must update immediately to prevent potential attacks.
Microsoft has released a critical security update to address CVE-2025-71229, a severe vulnerability that could allow remote attackers to execute arbitrary code on affected Windows systems. The flaw, which received a CVSS score of 9.8 out of 10, affects multiple Windows versions including Windows 10, Windows 11, and Windows Server platforms.
The vulnerability exists in the Windows Remote Desktop Services component, where improper validation of user-supplied input could enable an attacker to bypass authentication mechanisms and gain system-level access. Microsoft reports that the flaw is being actively exploited in the wild, making immediate patching essential.
Affected products include:
- Windows 10 Version 1809 through 21H2
- Windows 11 versions prior to 24H2
- Windows Server 2019 and 2022
- Windows Server 2025 (certain configurations)
The security update, released as part of Microsoft's monthly Patch Tuesday cycle, includes fixes that validate and sanitize input data before processing. Organizations are strongly advised to prioritize deployment of this update across their infrastructure.
Microsoft has also published detailed guidance for enterprise customers, including detection scripts and mitigation steps for environments where immediate patching isn't feasible. The company recommends enabling Windows Defender Credential Guard and restricting RDP access to trusted networks as additional protective measures.
For home users, Windows Update will automatically download and install the security patch. Business customers can access the update through Windows Server Update Services (WSUS) or Microsoft Endpoint Configuration Manager.
This vulnerability marks the third critical remote code execution flaw addressed by Microsoft in 2025, highlighting the ongoing importance of maintaining current security updates across all Windows deployments.
Comments
Please log in or register to join the discussion