CVE-2025-60703
Windows · Windows Remote Desktop
A high-severity vulnerability has been identified in Windows Remote Desktop, designated CVE-2025-60703.
Executive summary
A high-severity vulnerability has been identified in Windows Remote Desktop, designated CVE-2025-60703. This flaw allows an authenticated user who is already on a system to exploit a memory corruption error to gain full administrative privileges. Successful exploitation could lead to complete system compromise, data theft, or the installation of malicious software.
Vulnerability
This vulnerability is an untrusted pointer dereference within the Windows Remote Desktop service. It is a type of memory corruption flaw that occurs when the program attempts to use a memory pointer that it cannot trust, potentially leading to a crash or arbitrary code execution. An attacker who has already gained low-privileged access to a Windows system can craft a specific request to the Remote Desktop service to trigger this flaw, allowing them to execute code with elevated SYSTEM-level permissions.
Business impact
This vulnerability is rated as High severity with a CVSS score of 7.8. The primary business impact is the complete loss of confidentiality, integrity, and availability of the compromised system. An attacker with low-level user access (e.g., a standard employee account) could escalate their privileges to that of a domain administrator, allowing them to access and exfiltrate sensitive company data, deploy ransomware, disable security controls, and pivot to other systems on the network. This risk is particularly acute on multi-user systems such as terminal servers and Remote Desktop Session Hosts.
Remediation
Immediate Action: The primary remediation is to apply the security updates provided by the vendor to all affected Windows systems immediately. After patching, system administrators should monitor for any signs of exploitation attempts by reviewing system and application logs for unusual activity related to the Remote Desktop service.
Proactive Monitoring: Security teams should monitor for anomalous behavior, including unexpected processes being spawned by the Remote Desktop service (e.g., svchost.exe -k termsvcs). Specifically, look for the creation of command shells (cmd.exe, powershell.exe) or other suspicious executables. Review Windows Security Event Logs for unauthorized privilege escalation events (Event ID 4672) associated with non-administrative accounts.
Compensating Controls: If immediate patching is not feasible, organizations should implement compensating controls. Restrict Remote Desktop (RDP) access to only authorized and necessary administrative personnel. Enforce the principle of least privilege for all user accounts to limit the initial attack surface. Utilize Endpoint Detection and Response (EDR) solutions to detect and block memory exploitation techniques and anomalous process behavior.
Exploitation status
Public Exploit Available: False
Analyst recommendation
Given the high CVSS score and the critical nature of a privilege escalation vulnerability, we strongly recommend that organizations prioritize the deployment of the vendor-supplied patches to all affected systems. Special attention should be paid to high-value assets and multi-user systems like Remote Desktop servers. While an attacker requires prior authenticated access, this vulnerability provides a direct path to full system control in a post-compromise scenario. Although not currently on the CISA KEV list, its severity warrants immediate and decisive action to mitigate the risk of compromise.