CVE-2025-27919: n/a
An issue was discovered in AnyDesk through 9.0.4. A remotely connected user with the "Control my device" permission can manipulate remote AnyDesk settings and create a password for the Full Access profile without needing confirmation from the counterparty. Consequently, the attacker can later connect without this counterparty confirmation.
AI Analysis
Technical Summary
CVE-2025-27919 is a vulnerability identified in the AnyDesk remote desktop software through version 9.0.4. The flaw allows a remote user who has been granted the 'Control my device' permission to manipulate the remote AnyDesk client’s settings without the knowledge or confirmation of the device owner. Specifically, the attacker can create a password for the Full Access profile on the remote system, which normally requires explicit confirmation from the counterparty. By setting this password covertly, the attacker gains the ability to reconnect to the device later without needing any further approval, effectively establishing persistent unauthorized access. The vulnerability is classified under CWE-284 (Improper Access Control), indicating a failure to enforce proper permission checks. The CVSS v3.1 base score is 8.2 (high severity), with the vector indicating that the attack can be performed remotely over the network (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and affects confidentiality significantly (C:H), with limited impact on integrity (I:L) and no impact on availability (A:N). No known exploits are currently reported in the wild, and no patches have been linked yet, suggesting the vulnerability is newly disclosed. This issue poses a serious risk because it undermines the trust model of AnyDesk’s remote access permissions, allowing attackers to escalate their access and maintain persistence stealthily.
Potential Impact
For European organizations, the impact of this vulnerability is substantial, especially for those relying on AnyDesk for remote administration, teleworking, or customer support. Unauthorized persistent access could lead to exposure of sensitive corporate data, intellectual property theft, and potential lateral movement within networks. Confidentiality is highly impacted as attackers can access data without detection. Although integrity and availability impacts are limited, the ability to maintain undetected access can facilitate further attacks such as data exfiltration or deployment of malware. Critical sectors such as finance, healthcare, government, and industrial control systems that use AnyDesk for remote operations are particularly at risk. The lack of required user interaction or privileges lowers the barrier for exploitation, increasing the threat level. Additionally, the persistence mechanism bypasses normal user consent, complicating incident detection and response.
Mitigation Recommendations
Organizations should immediately audit AnyDesk usage and permissions, restricting 'Control my device' rights only to trusted users. Until patches are released, consider disabling AnyDesk remote control features or replacing AnyDesk with alternative remote access solutions with stronger access controls. Monitor AnyDesk configuration files and logs for unauthorized changes, especially the creation of Full Access profile passwords. Implement network segmentation to isolate systems that allow remote access and employ strict firewall rules to limit AnyDesk traffic to known, trusted endpoints. Educate users about the risks of granting remote control permissions and enforce multi-factor authentication on AnyDesk accounts where possible. Once patches are available, apply them promptly. Additionally, integrate AnyDesk monitoring into security information and event management (SIEM) systems to detect anomalous remote access patterns. Regularly review remote access policies and conduct penetration testing to verify the effectiveness of controls.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-27919: n/a
Description
An issue was discovered in AnyDesk through 9.0.4. A remotely connected user with the "Control my device" permission can manipulate remote AnyDesk settings and create a password for the Full Access profile without needing confirmation from the counterparty. Consequently, the attacker can later connect without this counterparty confirmation.
AI-Powered Analysis
Technical Analysis
CVE-2025-27919 is a vulnerability identified in the AnyDesk remote desktop software through version 9.0.4. The flaw allows a remote user who has been granted the 'Control my device' permission to manipulate the remote AnyDesk client’s settings without the knowledge or confirmation of the device owner. Specifically, the attacker can create a password for the Full Access profile on the remote system, which normally requires explicit confirmation from the counterparty. By setting this password covertly, the attacker gains the ability to reconnect to the device later without needing any further approval, effectively establishing persistent unauthorized access. The vulnerability is classified under CWE-284 (Improper Access Control), indicating a failure to enforce proper permission checks. The CVSS v3.1 base score is 8.2 (high severity), with the vector indicating that the attack can be performed remotely over the network (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and affects confidentiality significantly (C:H), with limited impact on integrity (I:L) and no impact on availability (A:N). No known exploits are currently reported in the wild, and no patches have been linked yet, suggesting the vulnerability is newly disclosed. This issue poses a serious risk because it undermines the trust model of AnyDesk’s remote access permissions, allowing attackers to escalate their access and maintain persistence stealthily.
Potential Impact
For European organizations, the impact of this vulnerability is substantial, especially for those relying on AnyDesk for remote administration, teleworking, or customer support. Unauthorized persistent access could lead to exposure of sensitive corporate data, intellectual property theft, and potential lateral movement within networks. Confidentiality is highly impacted as attackers can access data without detection. Although integrity and availability impacts are limited, the ability to maintain undetected access can facilitate further attacks such as data exfiltration or deployment of malware. Critical sectors such as finance, healthcare, government, and industrial control systems that use AnyDesk for remote operations are particularly at risk. The lack of required user interaction or privileges lowers the barrier for exploitation, increasing the threat level. Additionally, the persistence mechanism bypasses normal user consent, complicating incident detection and response.
Mitigation Recommendations
Organizations should immediately audit AnyDesk usage and permissions, restricting 'Control my device' rights only to trusted users. Until patches are released, consider disabling AnyDesk remote control features or replacing AnyDesk with alternative remote access solutions with stronger access controls. Monitor AnyDesk configuration files and logs for unauthorized changes, especially the creation of Full Access profile passwords. Implement network segmentation to isolate systems that allow remote access and employ strict firewall rules to limit AnyDesk traffic to known, trusted endpoints. Educate users about the risks of granting remote control permissions and enforce multi-factor authentication on AnyDesk accounts where possible. Once patches are available, apply them promptly. Additionally, integrate AnyDesk monitoring into security information and event management (SIEM) systems to detect anomalous remote access patterns. Regularly review remote access policies and conduct penetration testing to verify the effectiveness of controls.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-03-10T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 690cd9af1c9f718888294817
Added to database: 11/6/2025, 5:23:59 PM
Last enriched: 11/13/2025, 6:15:35 PM
Last updated: 12/21/2025, 8:18:11 PM
Views: 72
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14995: Stack-based Buffer Overflow in Tenda FH1201
HighCVE-2025-14994: Stack-based Buffer Overflow in Tenda FH1201
HighCVE-2025-14855: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in brainstormforce SureForms – Contact Form, Payment Form & Other Custom Form Builder
HighCVE-2025-14800: CWE-434 Unrestricted Upload of File with Dangerous Type in themeisle Redirection for Contact Form 7
HighCVE-2025-14993: Stack-based Buffer Overflow in Tenda AC18
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.