Skip to content
Threat Feed
critical advisory

CVE-2026-32157 - Remote Desktop Client Use-After-Free Vulnerability

CVE-2026-32157 is a use-after-free vulnerability in the Remote Desktop Client that allows an unauthorized attacker to execute code over a network.

CVE-2026-32157 is a critical use-after-free vulnerability affecting the Remote Desktop Client. This flaw allows an unauthenticated attacker to achieve remote code execution on a vulnerable system simply by interacting with the RDP service over a network. The vulnerability stems from improper memory management within the RDP client, leading to a condition where a program attempts to access memory that has already been freed, potentially resulting in arbitrary code execution. Successful exploitation of this vulnerability could lead to complete system compromise. The CVE was published on 2026-04-14, and defenders should prioritize patching and monitoring for exploitation attempts.

Attack Chain

  1. Attacker identifies a vulnerable Remote Desktop Client via network scanning or other reconnaissance methods.
  2. Attacker crafts a malicious RDP request designed to trigger the use-after-free vulnerability.
  3. The crafted RDP request is sent to the target system via TCP port 3389 (default RDP port).
  4. The Remote Desktop Client on the target system processes the malicious request, triggering the memory corruption.
  5. The use-after-free condition allows the attacker to overwrite memory, potentially injecting malicious code.
  6. The injected code is executed within the context of the Remote Desktop Client process (mstsc.exe).
  7. The attacker gains control of the system, potentially escalating privileges to SYSTEM.
  8. The attacker can then install malware, exfiltrate data, or perform other malicious actions.

Impact

Successful exploitation of CVE-2026-32157 can lead to complete compromise of the affected system. An attacker could gain unauthorized access to sensitive data, install malware, or use the compromised system as a foothold to pivot to other systems on the network. Given the ubiquitous nature of RDP in enterprise environments, a successful widespread exploitation could have significant impact across various sectors.

Recommendation

  • Apply the patch released by Microsoft to address CVE-2026-32157 immediately on all systems running Remote Desktop Client. The advisory URL is https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32157.
  • Deploy the Sigma rules provided in this brief to your SIEM to detect potential exploitation attempts targeting CVE-2026-32157.
  • Monitor network traffic for suspicious RDP connections and unusual activity originating from the mstsc.exe process based on the network_connection and process_creation Sigma rules.
  • Enable process creation logging to capture the execution of any malicious code injected via this vulnerability, as covered by the process_creation Sigma rule.

Detection coverage 2

Detect Suspicious RDP Client Process Creation

high

Detects unusual process creation by the Remote Desktop Client (mstsc.exe) that may indicate exploitation of CVE-2026-32157

sigma tactics: execution techniques: T1059.001, T1202 sources: process_creation, windows

Detect Outbound Network Connection from RDP Client to Unusual Ports

medium

Detects outbound network connections from mstsc.exe to non-standard ports, which could indicate reverse shell activity after CVE-2026-32157 exploitation.

sigma tactics: command_and_control techniques: T1071.001 sources: network_connection, windows

Detection queries are kept inside the platform. Get full rules →

Indicators of compromise

1

email

TypeValue
email[email protected]