advisory ID: ADV-2025-ALL-05
date issued: 14 May 2025
severity: Critical (CVE-2025-29966), High (CVE-2025-30397)
CVSs scores:
CVE-2025-29966 affects the Remote Desktop Protocol (RDP), allowing an attacker with access to a targeted system to execute arbitrary code. RDP is a common vector in both targeted and widespread cyberattacks, making this a high-risk flaw in enterprise environments.
The flaw resides in improper memory management within mstsc.exe and the RDP client-side protocol stack. When a specially crafted response is received from a malicious RDP server, it may trigger a heap overflow, enabling arbitrary code execution.
CVE-2025-30397 affects Internet Explorer Mode in Microsoft Edge and requires user interaction (e.g., clicking a crafted link), but successful exploitation enables unauthenticated remote attackers to achieve RCE. Despite IE being deprecated, many environments still rely on IE Mode, leaving them vulnerable.
Even though IE11 is deprecated, MSHTML, EdgeHTML, and related scripting components remain active through IE Mode in Edge and legacy app controls. The vulnerability stems from improper handling of script execution, allowing attackers to craft web content that leads to remote code execution when viewed.
Why IE cumulative updates are necessary
Security Only updates do not address vulnerabilities in scripting components used by IE Mode or WebBrowser controls. Organisations running older server versions must install Internet Explorer Cumulative Updates to fully mitigate the issue on:
Both CVE-2025-29966 and CVE-2025-30397 represent serious threats to organisations relying on Windows infrastructure, particularly where legacy or embedded components are in use. The Remote Desktop Client vulnerability (CVE-2025-29966) carries a critical rating due to its low complexity and high impact, while the scripting engine vulnerability (CVE-2025-30397) remains a high threat, especially in environments using IE mode or older server editions.
Integrity360 strongly advises immediate patching across all affected systems, reduction of RDP exposure, auditing of Internet Explorer dependencies, and ongoing user education to minimise attack surface and risk.
If you are worried about any of the threats outlined in this bulletin or need help in determining what steps you should take to protect yourself from the most material threats facing your organisation, please contact your account manager, or alternatively Get in touch to find out how you can protect your organisation.