Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27918: n/a

0
Critical
VulnerabilityCVE-2025-27918cvecve-2025-27918
Published: Thu Nov 06 2025 (11/06/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in AnyDesk for Windows before 9.0.5, AnyDesk for macOS before 9.0.1, AnyDesk for Linux before 7.0.0, AnyDesk for iOS before 7.1.2, and AnyDesk for Android before 8.0.0. It has an integer overflow and resultant heap-based buffer overflow via a UDP packet during processing of an Identity user image within the Discovery feature, or when establishing a connection between any two clients.

AI-Powered Analysis

AILast updated: 12/08/2025, 17:50:34 UTC

Technical Analysis

CVE-2025-27918 is a critical security vulnerability identified in AnyDesk remote desktop software versions prior to 9.0.5 on Windows, 9.0.1 on macOS, 7.0.0 on Linux, 7.1.2 on iOS, and 8.0.0 on Android. The vulnerability stems from an integer overflow leading to a heap-based buffer overflow triggered by specially crafted UDP packets. These packets are processed during the Discovery feature, which allows AnyDesk clients to detect other clients on the network, or during the establishment of connections between two clients. The integer overflow (CWE-190) causes improper memory allocation or boundary checks, enabling attackers to overwrite heap memory. This can result in arbitrary code execution, complete system compromise, or denial of service. The vulnerability is remotely exploitable without any authentication or user interaction, requiring only network access to the affected client. The CVSS v3.1 score of 9.8 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no privileges needed. Although no public exploits are currently known, the severity and ease of exploitation make this a critical threat. The vulnerability affects all major operating systems supported by AnyDesk, increasing the attack surface significantly. Given AnyDesk's widespread use for remote support and administration, exploitation could lead to unauthorized access to sensitive systems and data.

Potential Impact

For European organizations, the impact of CVE-2025-27918 is substantial. AnyDesk is widely used across Europe for remote desktop access in corporate, governmental, and critical infrastructure environments. Successful exploitation could allow attackers to execute arbitrary code remotely, leading to data breaches, espionage, ransomware deployment, or disruption of essential services. The vulnerability compromises confidentiality by exposing sensitive information accessible via remote sessions, integrity by allowing unauthorized changes to systems, and availability by potentially crashing or disabling affected clients. The lack of required authentication and user interaction means attackers can target vulnerable systems en masse, increasing the risk of widespread compromise. Sectors such as finance, healthcare, manufacturing, and public administration are particularly at risk due to their reliance on remote access tools and the sensitivity of their data. Additionally, the cross-platform nature of the vulnerability means that diverse IT environments are vulnerable, complicating defense efforts.

Mitigation Recommendations

1. Apply patches immediately once AnyDesk releases fixed versions for all affected platforms. Monitor AnyDesk’s official channels for updates. 2. Until patches are available, restrict UDP traffic related to AnyDesk at network perimeters using firewalls or intrusion prevention systems to limit exposure to untrusted networks. 3. Disable the Discovery feature if not required, as it is involved in the vulnerability trigger. 4. Implement network segmentation to isolate AnyDesk clients from sensitive systems and critical infrastructure. 5. Deploy enhanced network monitoring and anomaly detection to identify suspicious UDP packets or unusual AnyDesk connection attempts. 6. Educate IT and security teams about this vulnerability to ensure rapid incident response if exploitation attempts are detected. 7. Consider alternative secure remote access solutions temporarily if patching or mitigation is delayed. 8. Review and tighten AnyDesk configuration settings to minimize attack surface, including limiting inbound connections and enforcing strong authentication where possible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-03-10T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690cd9af1c9f718888294813

Added to database: 11/6/2025, 5:23:59 PM

Last enriched: 12/8/2025, 5:50:34 PM

Last updated: 12/20/2025, 11:02:37 PM

Views: 199

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats