CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

1
Analysis Generated
Apr 14, 2026 - 19:20 vuln.today

DescriptionNVD

Use after free in Remote Desktop Client allows an unauthorized attacker to execute code over a network.

AnalysisAI

Remote code execution in Microsoft Remote Desktop Client for Windows allows unauthenticated network attackers to execute arbitrary code by delivering a malicious connection file or server response, requiring user interaction. This use-after-free vulnerability (CWE-416) affects Windows 10 (versions 1607-22H2), Windows 11 (22H3-26H1), Windows Server (2012-2025), and standalone Remote Desktop client versions below 2.0.1070.0. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Identify all systems running affected Remote Desktop Client versions below 2.0.1070.0 and Windows Server 2012-2025; begin staged deployment planning. Within 7 days: Deploy vendor patches to standalone Remote Desktop Client (update to 2.0.1070.0 or later) and apply Windows cumulative security updates for Windows 10 (all versions 1607-22H2) and Windows 11 (versions 22H3-26H1); prioritize RDP-exposed systems and jump servers. …

Sign in for detailed remediation steps.

Share

CVE-2026-32157 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy