CVE-2019-25261
AnyDesk · AnyDesk 5
AnyDesk 5 is affected by a high-severity security vulnerability that could permit unauthorized access or system compromise. Immediate patching is required for all legacy installations.
Executive summary
AnyDesk 5 contains a high-severity vulnerability that poses a significant risk to remote access security and endpoint integrity.
Vulnerability
This late-disclosure vulnerability affects AnyDesk 5 and likely involves an authentication or session management flaw common in remote desktop applications. While specific technical details are limited, the CVSS score of 7.8 indicates a high-impact flaw that may allow an attacker to bypass security controls.
Business impact
The compromise of a remote access tool like AnyDesk is critical, as it can grant an attacker full control over the affected workstation. This could lead to the theft of intellectual property, installation of ransomware, or unauthorized access to internal network resources. The CVSS score of 7.8 reflects the substantial risk to organizational confidentiality and availability.
Remediation
Immediate Action: Update AnyDesk to the latest stable version (v6 or higher) immediately, as AnyDesk 5 is an older branch that may no longer receive comprehensive support.
Proactive Monitoring: Monitor network traffic for unusual AnyDesk connection patterns and audit session logs for unauthorized remote access events.
Compensating Controls: Use Multi-Factor Authentication (MFA) for all AnyDesk connections and restrict access via Access Control Lists (ACLs) to known IP addresses.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the critical role AnyDesk plays in remote infrastructure, users still running version 5 must upgrade to a modern, supported version immediately. The 7.8 CVSS score underscores the urgency of migrating away from vulnerable legacy software to mitigate the risk of unauthorized remote hijacking.