#Vulnerabilities

Microsoft Releases Critical Security Update for CVE-2025-68357 Vulnerability

Vulnerabilities Reporter
1 min read

Microsoft has issued a critical security update to address CVE-2025-68357, a high-severity vulnerability affecting multiple Windows versions. Users should apply patches immediately to prevent potential exploitation.

Microsoft Releases Critical Security Update for CVE-2025-68357 Vulnerability

Microsoft has issued an emergency security update to address CVE-2025-68357, a critical vulnerability affecting Windows operating systems. The flaw, rated 9.8/10 on the CVSS scale, allows remote code execution without authentication.

What's Affected

  • Windows 10 versions 1809 through 22H2
  • Windows 11 versions 21H2 through 24H2
  • Windows Server 2019 and 2022
  • Windows Server 2025 (preview builds)

Technical Details

The vulnerability exists in the Windows Remote Desktop Services component, specifically in how it handles malformed RDP packets. Attackers can exploit this flaw by sending specially crafted packets to port 3389, potentially gaining SYSTEM-level privileges.

Mitigation Steps

  1. Immediate Action Required

    • Install updates via Windows Update immediately
    • Restart systems after installation
    • Verify patch installation through Event Viewer
  2. Temporary Workarounds

    • Block port 3389 at network perimeter
    • Disable Remote Desktop Services if not needed
    • Enable Network Level Authentication (NLA)

Timeline

  • April 8, 2025: Vulnerability discovered by Microsoft Security Response Center
  • April 15, 2025: Patch released in coordination with Patch Tuesday
  • April 22, 2025: Public disclosure and exploitation attempts detected

Detection

Administrators can check for exploitation attempts by monitoring:

  • Event ID 4625 (failed logon attempts)
  • Unusual RDP connection patterns
  • Network traffic to port 3389 from unexpected sources

Additional Resources

Impact Assessment

Organizations with exposed RDP endpoints face immediate risk. Critical infrastructure and enterprise environments should prioritize patching within 24 hours. Home users should enable automatic updates if not already configured.

Comments

Loading comments...