
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
Windows Remote Desktop Services Remote Code Execution Vulnerability (CVE-2025-21309) is a Critical vulnerability discovered in January 2025. This vulnerability affects multiple versions of Windows Server, including Server 2012, 2012 R2, 2016, 2019, and 2022. With a CVSS score of 8.1, it allows remote, unauthenticated attackers to execute arbitrary code by exploiting a race condition when connecting to a system running the Remote Desktop Gateway role (Fortiguard Labs, CrowdStrike).
The vulnerability is characterized by a lack of input validation when handling requests in Microsoft Remote Desktop Services. It requires the attacker to win a race condition by precisely timing their actions when connecting to a system running the Remote Desktop Gateway role. Successful exploitation creates a use-after-free scenario that could lead to arbitrary code execution. The vulnerability has been assigned a CVSS v3.1 base score of 8.1 with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H (NVD).
Successful exploitation of this vulnerability could result in system compromise, allowing remote attackers to gain control of vulnerable systems. The attack can lead to arbitrary code execution in the security context of the application, potentially giving attackers complete control over the affected system (Fortiguard Labs).
Microsoft has released security patches to address this vulnerability. Organizations are advised to apply the most recent upgrade or patch from the vendor. The patches are available through the Microsoft Security Update Guide (Fortiguard Labs).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”