CVE-2025-29966

Published May 13, 2025

Last updated a month ago

Overview

Description
Heap-based buffer overflow in Windows Remote Desktop allows an unauthorized attacker to execute code over a network.
Source
secure@microsoft.com
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Primary
Base score
8.8
Impact score
5.9
Exploitability score
2.8
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Severity
HIGH

Weaknesses

secure@microsoft.com
CWE-122
nvd@nist.gov
CWE-787

Social media

Hype score
Not currently trending
  1. pruebaはわからんけど1個だけだし、まぁありきたり 朝イチのこいつはrdpなら開いているようで、CVE-2025-29966の実証コード出たら試しに撃って出てあげようと思った https://t.co/jMCvuuyqMS

    @oppssidsure_

    28 May 2025

    75 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. به تازگی برای سرویس RDP یا همان Remote Desktop دو آسیب پذیری خطرناک با نمره 8.8 و با کدهای شناسایی CVE-2025-29966 و CVE-2025-29967 منتشر شده است. این آسیب پذیری ها از نوع Buffer overflow ب

    @AmirHossein_sec

    18 May 2025

    22 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  3. Microsoft's May 2025 Patch Tuesday addresses critical Remote Desktop vulnerabilities (CVE-2025-29966, CVE-2025-29967). Apply patches now to prevent remote code execution risks. #CyberSecurity #WindowsUpdate https://t.co/KnNQUmy2eO

    @dailytechonx

    14 May 2025

    10 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. Microsoftは2025年5月の月例セキュリティ更新で、リモートデスクトップ関連の深刻な脆弱性を修正した。 特にCVE-2025-29966およびCVE-2025-29967は、リモートデスクトップクライアントおよびゲートウェイにおけるヒー

    @yousukezan

    14 May 2025

    1784 Impressions

    3 Retweets

    8 Likes

    4 Bookmarks

    0 Replies

    0 Quotes

  5. CVE-2025-29966 Heap-based buffer overflow in Windows Remote Desktop allows an unauthorized attacker to execute code over a network. https://t.co/p8htDUrPft

    @CVEnew

    13 May 2025

    6 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

Configurations

References

Sources include official advisories and independent security research.