Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2804 articles · 111159 vulns · 38/41 feeds (7d)
← Back to list
8.8
CVE-2026-32157EXPLOITEDPATCHED
microsoft · remote desktop

Remote Desktop Client Remote Code Execution Vulnerability

Description

Use after free in Remote Desktop Client allows an unauthorized attacker to execute code over a network.

Affected Products

VendorProductVersions
microsoftremote desktop1.2.0.0, 10.0.14393.0, 10.0.17763.0, 10.0.19044.0, 10.0.19045.0, 10.0.22631.0, 10.0.22631.0, 10.0.26100.0, 10.0.26200.0, 10.0.28000.0, 1.00, 6.2.9200.0, 6.2.9200.0, 6.3.9600.0, 6.3.9600.0, 10.0.14393.0, 10.0.14393.0, 10.0.17763.0, 10.0.17763.0, 10.0.20348.0, 10.0.25398.0, 10.0.26100.0, 10.0.26100.0

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
microsoftwindows 11 version 22h3mitre_affected90%
microsoftwindows server 2012 r2 (server core installation)mitre_affected90%
microsoftwindows 10 version 21h2mitre_affected90%
microsoftwindows server 2012 (server core installation)mitre_affected90%
microsoftwindowsmitre_affected90%

References

  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32157(vendor-advisory, patch)

Related News (6 articles)

Tier B
BSI Advisories17h ago
[NEU] [hoch] Microsoft Windows: Mehrere Schwachstellen
→ No new info (linked only)
Tier C
Cisco Talos1d ago
Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities
→ No new info (linked only)
Tier C
Qualys Blog1d ago
Microsoft and Adobe Patch Tuesday, April 2026 Security Update Review
→ No new info (linked only)
Tier C
VulDB1d ago
CVE-2026-32157 | Microsoft Windows up to Server 2025 Remote Desktop Client use after free
→ No new info (linked only)
Tier A
Microsoft MSRC1d ago
CVE-2026-32157 Remote Desktop Client Remote Code Execution Vulnerability
→ No new info (linked only)
Tier C
CrowdStrike Blog1d ago
April 2026 Patch Tuesday: Two Zero-Days and Eight Critical Vulnerabilities Among 164 CVEs
→ No new info (linked only)
CVSS 3.18.8 HIGH
VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
2.0.1070.010.0.14393.906010.0.17763.864410.0.19044.718410.0.19045.718410.0.22631.693610.0.26100.3269010.0.26200.824610.0.28000.18366.2.9200.260266.3.9600.2313210.0.20348.502010.0.25398.2274
CWECWE-416
PublishedApr 14, 2026
Last enriched1d agov3
Tags
CVE-2026-32157
Trending Score71
Source articles6
Independent6
Info Completeness10/14
Missing: epss, kev, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

MEDIUMCVE-2026-32201EXPKEV
Microsoft SharePoint Server Spoofing Vulnerability
Trending: 145
HIGHCVE-2026-21262EXPKEV
SQL Server Elevation of Privilege Vulnerability
Trending: 89
CRITICALCVE-2026-33824EXP
Windows Internet Key Exchange (IKE) Service Extensions Remote Code Execution Vulnerability
Trending: 87
HIGHCVE-2026-23666EXP
.NET Framework Denial of Service Vulnerability
Trending: 72
HIGHCVE-2026-33825EXP
Microsoft Defender Elevation of Privilege Vulnerability
Trending: 71

Pin to Dashboard

Verification

State: verified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 14, 2026
Discovered by ZDM
Apr 14, 2026
Updated: description, exploitAvailable, activelyExploited
Apr 14, 2026
Updated: tags
Apr 14, 2026
Actively Exploited
Apr 15, 2026
Exploit Available
Apr 15, 2026
Patch Available
Apr 15, 2026

Version History

v3
Last enriched 1d ago
v3Tier C1d ago

Updated severity to CRITICAL and added new CVE ID CVE-2026-32157.

tags
via VulDB
v2Tier A1d ago

Added a detailed description of the vulnerability and updated exploit availability to true.

descriptionexploitAvailableactivelyExploited
via Microsoft MSRC
v11d ago

Initial creation