CVE-2025-24045 Overview
CVE-2025-24045 is a critical remote code execution vulnerability affecting Windows Remote Desktop Services (RDS). The vulnerability stems from sensitive data storage in improperly locked memory, which allows an unauthorized attacker to execute arbitrary code over a network without requiring user interaction or prior authentication.
Remote Desktop Services is a core Windows Server component that enables remote administration and virtual desktop infrastructure deployments. Given the widespread use of RDS in enterprise environments and its network-accessible nature, this vulnerability presents a significant risk to organizations running affected Windows Server versions.
Critical Impact
Unauthorized remote attackers can achieve code execution on Windows Server systems running Remote Desktop Services, potentially leading to complete system compromise, lateral movement, and data exfiltration across enterprise networks.
Affected Products
- Microsoft Windows Server 2012 and Windows Server 2012 R2
- Microsoft Windows Server 2016
- Microsoft Windows Server 2019
- Microsoft Windows Server 2022
- Microsoft Windows Server 2022 23H2
- Microsoft Windows Server 2025
Discovery Timeline
- 2025-03-11 - CVE-2025-24045 published to NVD
- 2025-07-03 - Last updated in NVD database
Technical Details for CVE-2025-24045
Vulnerability Analysis
This vulnerability is classified under CWE-591 (Sensitive Data Storage in Improperly Locked Memory), indicating a fundamental flaw in how Windows Remote Desktop Services manages memory containing sensitive information. When memory that holds sensitive data is not properly locked, it may be accessible or manipulable by unauthorized processes or through network-based attacks.
The attack complexity is high, meaning successful exploitation requires specific conditions to be met. However, no privileges or user interaction are required, making this an attractive target for sophisticated threat actors. Successful exploitation grants the attacker the same privileges as the RDS service, which typically runs with elevated system privileges on Windows Server.
The impact spans all three security dimensions: confidentiality, integrity, and availability can all be highly compromised. An attacker could read sensitive data from server memory, modify system configurations or inject malicious code, and potentially crash or disable critical services.
Root Cause
The root cause lies in improper memory locking mechanisms within the Windows Remote Desktop Services implementation. When sensitive data is stored in memory that is not adequately protected through proper locking primitives, race conditions or memory access vulnerabilities can occur. This allows network-based attackers to potentially access or manipulate memory regions that should be protected, ultimately enabling code execution.
The vulnerability affects the core memory management routines used by RDS when handling incoming remote desktop connection requests and session data. Proper memory locking is essential for preventing unauthorized access to sensitive data structures, and the failure to implement this correctly creates an exploitable condition.
Attack Vector
The vulnerability is exploitable over the network without requiring authentication credentials or user interaction. An attacker targeting this vulnerability would craft specially designed network traffic directed at the Remote Desktop Services port (typically TCP 3389). The attack exploits the improper memory locking to gain unauthorized access to sensitive memory regions.
Due to the high attack complexity, exploitation likely requires precise timing or specific conditions related to the target's memory state. However, the lack of required privileges and user interaction means that any network-accessible RDS endpoint could potentially be targeted by a skilled attacker.
Detection Methods for CVE-2025-24045
Indicators of Compromise
- Unusual or malformed RDP connection attempts on TCP port 3389
- Unexpected memory access patterns or crashes in termservice.exe or related RDS processes
- Anomalous network traffic patterns targeting Remote Desktop Services
- Unexplained system instability or service restarts on RDS servers
Detection Strategies
- Monitor network traffic for unusual RDP protocol anomalies or malformed connection requests
- Implement endpoint detection and response (EDR) solutions to detect abnormal memory access in RDS-related processes
- Deploy intrusion detection/prevention systems (IDS/IPS) with signatures for RDP exploitation attempts
- Enable Windows Event Log monitoring for RDS service crashes or suspicious authentication events
Monitoring Recommendations
- Enable detailed logging for Remote Desktop Services including connection attempts and disconnections
- Configure SIEM alerts for repeated connection failures or unusual connection patterns to RDS endpoints
- Monitor process behavior for svchost.exe instances hosting Remote Desktop Services for memory anomalies
- Implement network segmentation monitoring to detect potential lateral movement following RDS compromise
How to Mitigate CVE-2025-24045
Immediate Actions Required
- Apply Microsoft's security update for CVE-2025-24045 immediately on all affected Windows Server systems
- Restrict RDP access to only necessary IP ranges using Windows Firewall or network access control lists
- Consider disabling Remote Desktop Services on systems where it is not required
- Implement Network Level Authentication (NLA) as an additional layer of protection
- Deploy Remote Desktop Gateway to add authentication and encryption layers before RDS access
Patch Information
Microsoft has released security updates addressing this vulnerability. Organizations should consult the Microsoft Security Response Center advisory for specific patch details and download links for each affected Windows Server version. Apply patches through Windows Update, WSUS, or manual installation based on your organization's patch management processes.
Workarounds
- Disable Remote Desktop Services if not required for business operations until patches can be applied
- Implement strict network-level access controls limiting RDP access to trusted networks only
- Use a VPN or Remote Desktop Gateway to ensure RDS is not directly exposed to the internet
- Enable Windows Firewall rules to restrict incoming connections on TCP port 3389 to authorized IP addresses only
- Consider implementing just-in-time (JIT) access for RDP connections to reduce the attack surface
# Windows Firewall configuration to restrict RDP access
netsh advfirewall firewall add rule name="RDP Restricted Access" dir=in action=allow protocol=tcp localport=3389 remoteip=10.0.0.0/8,192.168.0.0/16
# Disable RDP if not needed
Set-ItemProperty -Path 'HKLM:\System\CurrentControlSet\Control\Terminal Server' -Name "fDenyTSConnections" -Value 1
# Verify NLA is enabled
Get-ItemProperty -Path 'HKLM:\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp' -Name "UserAuthentication"
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


