{"id":341907,"date":"2025-07-09T06:50:00","date_gmt":"2025-07-09T13:50:00","guid":{"rendered":"https:\/\/cms-articles.softonic.io\/es\/?p=389295"},"modified":"2025-07-09T07:03:30","modified_gmt":"2025-07-09T14:03:30","slug":"a-security-problem-in-windows-could-allow-your-computer-to-be-hijacked","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/en\/a-security-problem-in-windows-could-allow-your-computer-to-be-hijacked\/","title":{"rendered":"A security problem in Windows could allow your computer to be hijacked"},"content":{"rendered":"\n<p>A critical vulnerability in Microsoft Remote Desktop Client, identified as CVE-2025-48817, could allow attackers to execute arbitrary code on victims&#8217; systems. <strong>This flaw affects multiple versions of Windows, posing a significant threat to organizations that rely on connections through the Remote Desktop Protocol (RDP)<\/strong>.<\/p>\n\n\n<h2 class=\"wp-block-heading\">Although simple, it requires us to do our part<\/h2>\n\n\n<p>Classified as a &#8220;relative path traversal&#8221; vulnerability and inadequate access control, CVE-2025-48817 has a CVSS score of 8.8, placing it in a high severity category. <strong>The attack vector is identified as low complexity and requires user interaction; no prior privileges are necessary for exploitation<\/strong>. However, the success of an attack depends on the victim connecting to a compromised remote desktop server.<\/p>\n\n\n<p>The attack is carried out through a man-in-the-middle scenario, where malicious actors control the server. <strong>Once the victim establishes a connection with the compromised server, the vulnerability allows attackers to escape the intended directory restrictions and execute code remotely<\/strong>, which can seriously impact the confidentiality, integrity, and availability of the data.<\/p>\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Introducing Windows 11\" width=\"840\" height=\"473\" src=\"https:\/\/www.youtube.com\/embed\/Uh9643c2P6k?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n<p><a href=\"https:\/\/microsoft-defender.softonic.com\/\">Microsoft has released security updates to mitigate this vulnerability<\/a>, <strong>recommending that organizations apply the patches KB5062553 and KB5062552 that cover a wide range of systems, from Windows Server 2008 to Windows 11<\/strong>. As no real-world exploitations have been reported, there is a critical window for organizations to remedy the situation before mass exploitation attempts occur.<\/p>\n\n\n<p>Customers should be aware that this vulnerability represents an inversion of the traditional security model, <strong>where they normally trust their servers<\/strong>. Users and administrators are urged to update their systems and software to protect against this emerging threat.<\/p>\n\n<div class=\"sc-card-program\">\r\n  <div class=\"sc-card-program__body\">\r\n    <div class=\"sc-card-program__row clearfix\">\r\n      <div class=\"sc-card-program__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-program__img\" alt=\"Windows 11\" src=\"https:\/\/images.sftcdn.net\/images\/t_app-icon-s\/p\/3a83edc2-8bcb-4baa-8fbe-3ddcf458c1a4\/1709716978\/windows-11-win11icon.png\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-title\">\r\n        <span class=\"sc-card-program__title\">Windows 11<\/span>\r\n        <a class=\"sc-card-program__button sc-card-program-internal\" href=\"https:\/\/windows-11.softonic.com\/\" target=\"_self\" rel=\"noopener noreferrer\">DOWNLOAD<\/a>\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-rating\">\r\n        <svg class=\"rating-score__content\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\" x=\"0\" y=\"0\" viewbox=\"0 0 50 50\" enable-background=\"new 0 0 50 50\" xml:space=\"preserve\"><path class=\"rating-score__background rating-score--good\" fill=\"none\" stroke-width=\"6\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><path class=\"rating-score__value rating-score__value--0\" fill=\"none\" stroke-width=\"6\" stroke-dashoffset=\"0\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><text class=\"rating-score__number\" content=\"\" text-anchor=\"middle\" transform=\"matrix(1 0 0 1 25 31.0837)\" data-auto=\"app-user-score\"><\/text><\/svg>\r\n      <\/div>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <span class=\"sc-card-program__description\"><\/span>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <img decoding=\"async\" class=\"sc-card-program__bigpic\" src=\"\" onerror=\"this.style.display='none'\">\r\n    <\/div>\r\n    <a class=\"sc-card-program__link track-link sc-card-program-internal\" href=\"https:\/\/windows-11.softonic.com\/\" target=\"_self\" rel=\"noopener noreferrer\"><\/a>\r\n  <\/div>\r\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>A critical vulnerability in Microsoft Remote Desktop Client, identified as CVE-2025-48817, could allow attackers to execute arbitrary code on victim systems. This flaw affects multiple versions of Windows, posing a significant threat to organizations that rely on connections through the Remote Desktop Protocol (RDP). Although simple, it requires us to do our part Classified as a &#8220;relative path traversal&#8221; vulnerability and inadequate access control, CVE-2025-48817 has a CVSS score of 8.8, placing it in a high severity category. The attack vector is identified as low complexity and [&#8230;]<\/p>\n","protected":false},"author":9318,"featured_media":341908,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":0},"categories":[1015,11143],"tags":[13664,3808,13665,1080,13666,13667],"usertag":[],"vertical":[],"content-category":[7176],"class_list":["post-341907","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-softwaresecurity","tag-microsoft-remote-desktop-client","tag-seguridad","tag-vulnerabilidad","tag-windows","tag-windows-defense","tag-windwos-11","content-category-seguridad-privacidad"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/341907","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/users\/9318"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/comments?post=341907"}],"version-history":[{"count":2,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/341907\/revisions"}],"predecessor-version":[{"id":341911,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/341907\/revisions\/341911"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media\/341908"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media?parent=341907"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/categories?post=341907"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/tags?post=341907"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/usertag?post=341907"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/vertical?post=341907"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/content-category?post=341907"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}