CVE-2026-2590: Vulnerability in Devolutions Remote Desktop Manager
Improper enforcement of the Disable password saving in vaults setting in the connection entry component in Devolutions Remote Desktop Manager 2025.3.30 and earlier allows an authenticated user to persist credentials in vault entries, potentially exposing sensitive information to other users, by creating or editing certain connection types while password saving is disabled.
AI Analysis
Technical Summary
CVE-2026-2590 is a security vulnerability identified in Devolutions Remote Desktop Manager (RDM) versions 2025.3.30 and earlier. The issue stems from improper enforcement of the 'Disable password saving in vaults' setting within the connection entry component. This setting is intended to prevent users from saving passwords in vault entries for certain connection types, enhancing security by limiting credential persistence. However, due to this vulnerability, an authenticated user can circumvent this restriction by creating or editing specific connection types, thereby persisting credentials even when password saving is supposed to be disabled. This behavior can lead to unauthorized exposure of sensitive credentials stored in vault entries to other users who have access to the same RDM environment. Since RDM is widely used for managing remote connections and credentials, this flaw undermines the confidentiality of stored passwords and could facilitate insider threats or lateral movement within an organization. Exploitation requires the attacker to have valid authentication credentials but does not require additional user interaction, making it a relatively straightforward attack vector once access is obtained. No CVSS score has been assigned yet, and no known exploits have been reported in the wild. The vulnerability was reserved in mid-February 2026 and published in early March 2026, indicating recent discovery. The vendor has not yet provided a patch or mitigation guidance publicly, emphasizing the need for organizations to implement interim controls.
Potential Impact
The primary impact of CVE-2026-2590 is the compromise of credential confidentiality within Devolutions Remote Desktop Manager environments. By allowing authenticated users to persist passwords despite the disabling setting, sensitive credentials may be exposed to unauthorized users who share access to the vault. This can lead to unauthorized access to critical systems, facilitating lateral movement, privilege escalation, or data breaches. Organizations that rely heavily on RDM for managing remote access credentials, especially in multi-user or shared environments, face increased risk of insider threats or accidental credential leakage. The vulnerability does not directly affect system availability or integrity but significantly undermines trust in credential management. Since exploitation requires authentication, external attackers must first compromise user credentials or gain insider access, but once inside, the risk of further compromise is elevated. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially in targeted attacks. The scope includes all affected versions globally, impacting sectors such as finance, government, healthcare, and technology where secure remote access is critical.
Mitigation Recommendations
Until an official patch is released by Devolutions, organizations should implement several specific mitigations: 1) Restrict user permissions within Remote Desktop Manager to the minimum necessary, limiting who can create or edit connection entries. 2) Enforce strict access controls and monitoring on vault entries to detect unauthorized credential persistence or modifications. 3) Conduct regular audits of stored credentials and connection configurations to identify any instances where passwords have been saved contrary to policy. 4) Educate users about the risk of credential exposure and enforce strong authentication mechanisms to reduce the likelihood of compromised accounts. 5) Consider isolating or segmenting RDM environments to limit the impact of insider threats. 6) Monitor vendor communications closely and apply security updates immediately once available. 7) If feasible, temporarily disable or limit use of the affected connection types that allow password saving until a fix is applied. These targeted actions go beyond generic advice by focusing on controlling the specific attack vector and reducing credential exposure risk in shared environments.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Netherlands, Switzerland, Japan, South Korea
CVE-2026-2590: Vulnerability in Devolutions Remote Desktop Manager
Description
Improper enforcement of the Disable password saving in vaults setting in the connection entry component in Devolutions Remote Desktop Manager 2025.3.30 and earlier allows an authenticated user to persist credentials in vault entries, potentially exposing sensitive information to other users, by creating or editing certain connection types while password saving is disabled.
AI-Powered Analysis
Technical Analysis
CVE-2026-2590 is a security vulnerability identified in Devolutions Remote Desktop Manager (RDM) versions 2025.3.30 and earlier. The issue stems from improper enforcement of the 'Disable password saving in vaults' setting within the connection entry component. This setting is intended to prevent users from saving passwords in vault entries for certain connection types, enhancing security by limiting credential persistence. However, due to this vulnerability, an authenticated user can circumvent this restriction by creating or editing specific connection types, thereby persisting credentials even when password saving is supposed to be disabled. This behavior can lead to unauthorized exposure of sensitive credentials stored in vault entries to other users who have access to the same RDM environment. Since RDM is widely used for managing remote connections and credentials, this flaw undermines the confidentiality of stored passwords and could facilitate insider threats or lateral movement within an organization. Exploitation requires the attacker to have valid authentication credentials but does not require additional user interaction, making it a relatively straightforward attack vector once access is obtained. No CVSS score has been assigned yet, and no known exploits have been reported in the wild. The vulnerability was reserved in mid-February 2026 and published in early March 2026, indicating recent discovery. The vendor has not yet provided a patch or mitigation guidance publicly, emphasizing the need for organizations to implement interim controls.
Potential Impact
The primary impact of CVE-2026-2590 is the compromise of credential confidentiality within Devolutions Remote Desktop Manager environments. By allowing authenticated users to persist passwords despite the disabling setting, sensitive credentials may be exposed to unauthorized users who share access to the vault. This can lead to unauthorized access to critical systems, facilitating lateral movement, privilege escalation, or data breaches. Organizations that rely heavily on RDM for managing remote access credentials, especially in multi-user or shared environments, face increased risk of insider threats or accidental credential leakage. The vulnerability does not directly affect system availability or integrity but significantly undermines trust in credential management. Since exploitation requires authentication, external attackers must first compromise user credentials or gain insider access, but once inside, the risk of further compromise is elevated. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially in targeted attacks. The scope includes all affected versions globally, impacting sectors such as finance, government, healthcare, and technology where secure remote access is critical.
Mitigation Recommendations
Until an official patch is released by Devolutions, organizations should implement several specific mitigations: 1) Restrict user permissions within Remote Desktop Manager to the minimum necessary, limiting who can create or edit connection entries. 2) Enforce strict access controls and monitoring on vault entries to detect unauthorized credential persistence or modifications. 3) Conduct regular audits of stored credentials and connection configurations to identify any instances where passwords have been saved contrary to policy. 4) Educate users about the risk of credential exposure and enforce strong authentication mechanisms to reduce the likelihood of compromised accounts. 5) Consider isolating or segmenting RDM environments to limit the impact of insider threats. 6) Monitor vendor communications closely and apply security updates immediately once available. 7) If feasible, temporarily disable or limit use of the affected connection types that allow password saving until a fix is applied. These targeted actions go beyond generic advice by focusing on controlling the specific attack vector and reducing credential exposure risk in shared environments.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- DEVOLUTIONS
- Date Reserved
- 2026-02-16T15:57:08.878Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69a75724d1a09e29cb7c9d2a
Added to database: 3/3/2026, 9:48:20 PM
Last enriched: 3/3/2026, 10:04:08 PM
Last updated: 3/4/2026, 7:18:03 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2732: CWE-862 Missing Authorization in shortpixel Enable Media Replace
MediumCVE-2026-2363: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in cbutlerjr WP-Members Membership Plugin
MediumCVE-2026-2025: CWE-200 Information Exposure in Mail Mint
HighCVE-2026-27012: CWE-306: Missing Authentication for Critical Function in devcode-it openstamanager
CriticalCVE-2026-28289: CWE-434: Unrestricted Upload of File with Dangerous Type in freescout-help-desk freescout
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.