First published: Tue Feb 11 2025(Updated: )
Windows Remote Desktop Configuration Service Tampering Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 10 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows 10 | =22H2 | |
Microsoft Windows Server 2025 | ||
Microsoft Windows Server 2022 23H2 | ||
Microsoft Windows Server 2016 | ||
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 10 | =21H2 | |
Microsoft Windows Server 2025 | ||
Microsoft Windows 10 | =1809 | |
Microsoft Windows 11 | =23H2 | |
Microsoft Windows 11 | =24H2 | |
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 11 | =23H2 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows 10 | =22H2 | |
Microsoft Windows 10 | ||
Microsoft Windows Server 2022 | ||
Microsoft Windows 11 | =24H2 | |
Microsoft Windows 11 | =22H2 | |
Microsoft Windows 10 | =1607 | |
Microsoft Windows 11 | =22H2 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows 10 | =22H2 | |
Microsoft Windows Server 2019 | ||
Microsoft Windows 10 | =1809 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-21349 is classified as a high-severity tampering vulnerability affecting the Windows Remote Desktop Configuration Service.
To fix CVE-2025-21349, it is recommended to apply the appropriate patches provided by Microsoft for your affected Windows version.
CVE-2025-21349 affects multiple versions including Windows 10, Windows Server 2019, Windows 11, and several others.
If CVE-2025-21349 is not addressed, it may allow an attacker to tamper with the Remote Desktop service configuration, potentially compromising system integrity.
While the recommended action is to apply patches, organizations may also want to limit Remote Desktop access or monitor for unauthorized changes as a temporary workaround.