Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2387 articles · 112013 vulns · 38/41 feeds (7d)
← Back to list
8.8
CVE-2026-32157EXPLOITEDPATCHED
microsoft · remote desktop

Remote Desktop Client Remote Code Execution Vulnerability

Description

Use after free in Remote Desktop Client allows an unauthorized attacker to execute code over a network.

Affected Products

VendorProductVersions
microsoftremote desktop1.2.0.0, 10.0.14393.0, 10.0.17763.0, 10.0.19044.0, 10.0.19045.0, 10.0.22631.0, 10.0.22631.0, 10.0.26100.0, 10.0.26200.0, 10.0.28000.0, 1.00, 6.2.9200.0, 6.2.9200.0, 6.3.9600.0, 6.3.9600.0, 10.0.14393.0, 10.0.14393.0, 10.0.17763.0, 10.0.17763.0, 10.0.20348.0, 10.0.25398.0, 10.0.26100.0, 10.0.26100.0

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
microsoftwindows 11 version 22h3mitre_affected90%
microsoftwindows server 2012 r2 (server core installation)mitre_affected90%
microsoftwindows 10 version 21h2mitre_affected90%
microsoftwindows server 2012 (server core installation)mitre_affected90%
microsoftwindowsmitre_affected90%

References

  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32157(vendor-advisory, patch)

Related News (5 articles)

Tier C
Cisco Talos6d ago
Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent Vulnerabilities
→ No new info (linked only)
Tier C
Qualys Blog6d ago
Microsoft and Adobe Patch Tuesday, April 2026 Security Update Review
→ No new info (linked only)
Tier C
VulDB6d ago
CVE-2026-32157 | Microsoft Windows up to Server 2025 Remote Desktop Client use after free
→ No new info (linked only)
Tier A
Microsoft MSRC6d ago
CVE-2026-32157 Remote Desktop Client Remote Code Execution Vulnerability
→ No new info (linked only)
Tier C
CrowdStrike Blog7d ago
April 2026 Patch Tuesday: Two Zero-Days and Eight Critical Vulnerabilities Among 164 CVEs
→ No new info (linked only)
CVSS 3.18.8 HIGH
VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
2.0.1070.010.0.14393.906010.0.17763.864410.0.19044.718410.0.19045.718410.0.22631.693610.0.26100.3269010.0.26200.824610.0.28000.18366.2.9200.260266.3.9600.2313210.0.20348.502010.0.25398.2274
CWECWE-416
PublishedApr 14, 2026
Last enriched6d agov3
Tags
CVE-2026-32157
Trending Score31
Source articles5
Independent5
Info Completeness10/14
Missing: epss, kev, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

MEDIUMCVE-2026-32201EXPKEV
Microsoft SharePoint Server Spoofing Vulnerability
Trending: 143
HIGHCVE-2026-33825EXPKEV
Microsoft Defender Elevation of Privilege Vulnerability
Trending: 118
HIGHCVE-2026-21262EXPKEV
SQL Server Elevation of Privilege Vulnerability
Trending: 41
HIGHCVE-2026-21523
GitHub Copilot and Visual Studio Code Remote Code Execution Vulnerability
Trending: 40
CRITICALCVE-2026-33824EXP
Windows Internet Key Exchange (IKE) Service Extensions Remote Code Execution Vulnerability
Trending: 40

Pin to Dashboard

Verification

State: verified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 14, 2026
Discovered by ZDM
Apr 14, 2026
Updated: description, exploitAvailable, activelyExploited
Apr 14, 2026
Updated: tags
Apr 14, 2026
Actively Exploited
Apr 20, 2026
Exploit Available
Apr 20, 2026
Patch Available
Apr 20, 2026

Version History

v3
Last enriched 6d ago
v3Tier C6d ago

Updated severity to CRITICAL and added new CVE ID CVE-2026-32157.

tags
via VulDB
v2Tier A6d ago

Added a detailed description of the vulnerability and updated exploit availability to true.

descriptionexploitAvailableactivelyExploited
via Microsoft MSRC
v16d ago

Initial creation