CVE-2025-5334

7.5 HIGH

📋 TL;DR

This vulnerability in Devolutions Remote Desktop Manager allows authenticated users to access private personal information when entries are unintentionally moved from user vaults to shared vaults during editing. It affects all major platform versions of Remote Desktop Manager 2025.1 and earlier.

💻 Affected Systems

Products:
  • Devolutions Remote Desktop Manager
Versions: Windows 2025.1.34.0 and earlier, macOS 2025.1.16.3 and earlier, Android 2025.1.3.3 and earlier, iOS 2025.1.6.0 and earlier
Operating Systems: Windows, macOS, Android, iOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments using the vulnerable versions; requires authenticated user access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive credentials, personal data, and connection information are exposed to unauthorized authenticated users, potentially leading to lateral movement and data breaches.

🟠

Likely Case

Accidental exposure of user vault entries containing passwords, API keys, or connection details to other users with shared vault access.

🟢

If Mitigated

Limited exposure if strict access controls and vault segregation policies are already implemented.

🌐 Internet-Facing: MEDIUM - Requires authenticated access but could be exploited if the application is internet-facing with compromised credentials.
🏢 Internal Only: HIGH - Authenticated internal users can exploit this to access sensitive information from other users' vaults.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and specific editing actions that trigger the vault transfer bug.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after those listed in affected systems (check vendor advisory for exact fixed versions)

Vendor Advisory: https://devolutions.net/security/advisories/DEVO-2025-0009

Restart Required: Yes

Instructions:

1. Update Remote Desktop Manager to the latest version. 2. Restart the application. 3. Verify no entries were unintentionally moved to shared vaults.

🔧 Temporary Workarounds

Disable entry editing in user vaults

all

Prevent users from editing entries in their personal vaults to avoid triggering the bug

Audit shared vault permissions

all

Review and restrict access to shared vaults to minimize exposure if entries are moved

🧯 If You Can't Patch

  • Implement strict access controls and audit all shared vault entries regularly
  • Educate users to avoid editing sensitive entries until patched and monitor for unusual access patterns

🔍 How to Verify

Check if Vulnerable:

Check your Remote Desktop Manager version against affected versions listed in the advisory

Check Version:

In RDM: Help → About (Windows/macOS) or Settings → About (mobile)

Verify Fix Applied:

Update to latest version and verify no entries appear unexpectedly in shared vaults

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to shared vaults
  • Multiple entry modifications in short timeframes

Network Indicators:

  • Increased data transfers from RDM server if using centralized deployment

SIEM Query:

Search for RDM logs showing entry modifications followed by shared vault access events

🔗 References

📤 Share & Export