CVE-2025-1635

6.5 MEDIUM

📋 TL;DR

This vulnerability in Devolutions Remote Desktop Manager allows authenticated users to export hub data sources containing their authenticated session information due to faulty business logic. This exposes sensitive session data that could be used for unauthorized access. Affected users are those running vulnerable versions on Windows who have hub data source export permissions.

💻 Affected Systems

Products:
  • Devolutions Remote Desktop Manager
Versions: 2024.3.29 and earlier
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects users with permissions to export hub data sources. Requires Windows operating system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated malicious insider exports hub data containing active session tokens, then uses those tokens to gain unauthorized access to sensitive systems and credentials managed by Remote Desktop Manager.

🟠

Likely Case

Accidental exposure of session information through legitimate export operations, potentially allowing session hijacking if exported files are mishandled or accessed by unauthorized parties.

🟢

If Mitigated

Limited impact with proper access controls and monitoring, as exploitation requires authenticated user access and the vulnerability doesn't bypass authentication mechanisms.

🌐 Internet-Facing: LOW - Exploitation requires authenticated access to the application, which typically isn't directly internet-facing.
🏢 Internal Only: MEDIUM - Internal authenticated users can exploit this, making it a concern for insider threats and accidental exposure scenarios.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated user access and hub data source export permissions. The vulnerability is in business logic rather than a technical flaw.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.3.30 or later

Vendor Advisory: https://devolutions.net/security/advisories/DEVO-2025-0004/

Restart Required: Yes

Instructions:

1. Download and install Remote Desktop Manager version 2024.3.30 or later from official Devolutions sources. 2. Close all Remote Desktop Manager instances. 3. Run the installer. 4. Restart the application after installation completes.

🔧 Temporary Workarounds

Restrict Hub Data Source Export Permissions

windows

Limit which users can export hub data sources to only trusted administrators who require this functionality.

Monitor Export Activities

all

Implement logging and monitoring for hub data source export operations to detect suspicious activity.

🧯 If You Can't Patch

  • Implement strict access controls to limit hub data source export capabilities to essential personnel only
  • Establish procedures for secure handling of exported data and implement data loss prevention controls

🔍 How to Verify

Check if Vulnerable:

Check Remote Desktop Manager version in Help > About. If version is 2024.3.29 or earlier, the system is vulnerable.

Check Version:

In Remote Desktop Manager, navigate to Help > About to view version information

Verify Fix Applied:

After patching, verify version shows 2024.3.30 or later in Help > About. Test hub data source export to confirm session information is no longer included.

📡 Detection & Monitoring

Log Indicators:

  • Unusual frequency of hub data source exports
  • Exports performed by non-administrative users
  • Large export file sizes indicating potential data exfiltration

Network Indicators:

  • Unusual data transfers from Remote Desktop Manager instances
  • Exported files being transferred to unauthorized locations

SIEM Query:

source="RemoteDesktopManager" AND (event="Export" OR event="DataExport") AND user NOT IN (admin_users)

🔗 References

📤 Share & Export