CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Lifecycle Timeline
1DescriptionNVD
Use after free in Remote Desktop Client allows an unauthorized attacker to execute code over a network.
AnalysisAI
Remote code execution in Microsoft Remote Desktop Client for Windows allows unauthenticated network attackers to execute arbitrary code by delivering a malicious connection file or server response, requiring user interaction. This use-after-free vulnerability (CWE-416) affects Windows 10 (versions 1607-22H2), Windows 11 (22H3-26H1), Windows Server (2012-2025), and standalone Remote Desktop client versions below 2.0.1070.0. …
Sign in for full analysis, threat intelligence, and remediation guidance.
RemediationAI
Within 24 hours: Identify all systems running affected Remote Desktop Client versions below 2.0.1070.0 and Windows Server 2012-2025; begin staged deployment planning. Within 7 days: Deploy vendor patches to standalone Remote Desktop Client (update to 2.0.1070.0 or later) and apply Windows cumulative security updates for Windows 10 (all versions 1607-22H2) and Windows 11 (versions 22H3-26H1); prioritize RDP-exposed systems and jump servers. …
Sign in for detailed remediation steps.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2026-22545
GHSA-5468-67hp-7rjg