Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2590: Vulnerability in Devolutions Remote Desktop Manager

0
Unknown
VulnerabilityCVE-2026-2590cvecve-2026-2590
Published: Tue Mar 03 2026 (03/03/2026, 21:22:34 UTC)
Source: CVE Database V5
Vendor/Project: Devolutions
Product: Remote Desktop Manager

Description

Improper enforcement of the Disable password saving in vaults setting in the connection entry component in Devolutions Remote Desktop Manager 2025.3.30 and earlier allows an authenticated user to persist credentials in vault entries, potentially exposing sensitive information to other users, by creating or editing certain connection types while password saving is disabled.

AI-Powered Analysis

AILast updated: 03/03/2026, 22:04:08 UTC

Technical Analysis

CVE-2026-2590 is a security vulnerability identified in Devolutions Remote Desktop Manager (RDM) versions 2025.3.30 and earlier. The issue stems from improper enforcement of the 'Disable password saving in vaults' setting within the connection entry component. This setting is intended to prevent users from saving passwords in vault entries for certain connection types, enhancing security by limiting credential persistence. However, due to this vulnerability, an authenticated user can circumvent this restriction by creating or editing specific connection types, thereby persisting credentials even when password saving is supposed to be disabled. This behavior can lead to unauthorized exposure of sensitive credentials stored in vault entries to other users who have access to the same RDM environment. Since RDM is widely used for managing remote connections and credentials, this flaw undermines the confidentiality of stored passwords and could facilitate insider threats or lateral movement within an organization. Exploitation requires the attacker to have valid authentication credentials but does not require additional user interaction, making it a relatively straightforward attack vector once access is obtained. No CVSS score has been assigned yet, and no known exploits have been reported in the wild. The vulnerability was reserved in mid-February 2026 and published in early March 2026, indicating recent discovery. The vendor has not yet provided a patch or mitigation guidance publicly, emphasizing the need for organizations to implement interim controls.

Potential Impact

The primary impact of CVE-2026-2590 is the compromise of credential confidentiality within Devolutions Remote Desktop Manager environments. By allowing authenticated users to persist passwords despite the disabling setting, sensitive credentials may be exposed to unauthorized users who share access to the vault. This can lead to unauthorized access to critical systems, facilitating lateral movement, privilege escalation, or data breaches. Organizations that rely heavily on RDM for managing remote access credentials, especially in multi-user or shared environments, face increased risk of insider threats or accidental credential leakage. The vulnerability does not directly affect system availability or integrity but significantly undermines trust in credential management. Since exploitation requires authentication, external attackers must first compromise user credentials or gain insider access, but once inside, the risk of further compromise is elevated. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially in targeted attacks. The scope includes all affected versions globally, impacting sectors such as finance, government, healthcare, and technology where secure remote access is critical.

Mitigation Recommendations

Until an official patch is released by Devolutions, organizations should implement several specific mitigations: 1) Restrict user permissions within Remote Desktop Manager to the minimum necessary, limiting who can create or edit connection entries. 2) Enforce strict access controls and monitoring on vault entries to detect unauthorized credential persistence or modifications. 3) Conduct regular audits of stored credentials and connection configurations to identify any instances where passwords have been saved contrary to policy. 4) Educate users about the risk of credential exposure and enforce strong authentication mechanisms to reduce the likelihood of compromised accounts. 5) Consider isolating or segmenting RDM environments to limit the impact of insider threats. 6) Monitor vendor communications closely and apply security updates immediately once available. 7) If feasible, temporarily disable or limit use of the affected connection types that allow password saving until a fix is applied. These targeted actions go beyond generic advice by focusing on controlling the specific attack vector and reducing credential exposure risk in shared environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
DEVOLUTIONS
Date Reserved
2026-02-16T15:57:08.878Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a75724d1a09e29cb7c9d2a

Added to database: 3/3/2026, 9:48:20 PM

Last enriched: 3/3/2026, 10:04:08 PM

Last updated: 3/4/2026, 7:18:03 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses