CVE-2025-13683

6.5 MEDIUM

📋 TL;DR

This vulnerability in Devolutions Server and Remote Desktop Manager exposes credentials through unintended requests, potentially allowing attackers to access sensitive authentication data. It affects organizations using these products on Windows systems. The exposure occurs when credentials are inadvertently included in requests where they shouldn't be present.

💻 Affected Systems

Products:
  • Devolutions Server
  • Remote Desktop Manager
Versions: Devolutions Server: through 2025.3.8.0; Remote Desktop Manager: through 2025.3.23.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Windows installations of both products. The vulnerability exists in the core functionality that handles credential requests.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative credentials leading to complete compromise of Devolutions Server, unauthorized access to all managed remote connections, and potential lateral movement across the network.

🟠

Likely Case

Unauthorized users access credentials for specific remote systems, leading to compromised individual servers or workstations managed through the platform.

🟢

If Mitigated

Credential exposure is limited to non-critical systems or temporary credentials with minimal privileges, preventing significant damage.

🌐 Internet-Facing: HIGH if Devolutions Server is exposed to the internet, as attackers could remotely harvest credentials without network access.
🏢 Internal Only: MEDIUM for internal deployments, requiring attacker to have some level of network access to exploit the vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of the credential request mechanism and ability to intercept or generate specific requests. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Devolutions Server: 2025.3.8.1 or later; Remote Desktop Manager: 2025.3.23.1 or later

Vendor Advisory: https://devolutions.net/security/advisories/DEVO-2025-0017/

Restart Required: Yes

Instructions:

1. Download the latest version from Devolutions website. 2. Backup current configuration. 3. Run the installer for the patched version. 4. Restart the service/application. 5. Verify the update was successful.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Devolutions Server and Remote Desktop Manager instances to only trusted users and systems

Credential Rotation

all

Rotate all credentials stored in the affected products to limit exposure window

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can communicate with Devolutions Server
  • Enable detailed logging and monitoring for unusual credential access patterns

🔍 How to Verify

Check if Vulnerable:

Check the version in Devolutions Server admin panel or Remote Desktop Manager About dialog. If version is at or below affected versions, system is vulnerable.

Check Version:

In Devolutions Server: Check Admin Panel → System Information. In Remote Desktop Manager: Help → About.

Verify Fix Applied:

Verify version is 2025.3.8.1 or later for Devolutions Server, or 2025.3.23.1 or later for Remote Desktop Manager. Test credential requests to ensure no unintended exposure.

📡 Detection & Monitoring

Log Indicators:

  • Unusual credential request patterns
  • Multiple failed credential access attempts from single source
  • Credential requests from unexpected IP addresses

Network Indicators:

  • Unusual volume of requests to credential endpoints
  • Requests to credential APIs from unauthorized sources

SIEM Query:

source="devolutions.log" AND (credential_request OR auth_request) AND status=200 | stats count by src_ip

🔗 References

📤 Share & Export