{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T00:30:07.574","vulnerabilities":[{"cve":{"id":"CVE-2025-2562","sourceIdentifier":"security@devolutions.net","published":"2025-03-26T18:15:26.247","lastModified":"2025-07-02T17:32:38.117","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Insufficient logging in the autotyping feature in Devolutions Remote Desktop Manager on Windows allows an authenticated user to use a stored password without generating a corresponding log event, via the use of the autotyping functionality.\n\n\n\n\n\n\n\nThis issue affects Remote Desktop Manager versions from 2025.1.24 through 2025.1.25, and all versions up to 2024.3.29."},{"lang":"es","value":"Un registro insuficiente en la función de autoescritura de Devolutions Remote Desktop Manager en Windows permite que un usuario autenticado use una contraseña almacenada sin generar el evento de registro correspondiente mediante la función de autoescritura. Este problema afecta a las versiones de Remote Desktop Manager desde la 2025.1.24 hasta la 2025.1.25, y a todas las versiones hasta la 2024.3.29."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.5}]},"weaknesses":[{"source":"security@devolutions.net","type":"Secondary","description":[{"lang":"en","value":"CWE-778"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:free:windows:*:*","versionEndExcluding":"2024.3.31.0","matchCriteriaId":"0C146019-3232-4413-BB31-AC876E37BFE5"},{"vulnerable":true,"criteria":"cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:team:windows:*:*","versionEndExcluding":"2024.3.31.0","matchCriteriaId":"183673B7-2357-4FA7-98E7-32F986B65BC3"},{"vulnerable":true,"criteria":"cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:free:windows:*:*","versionStartIncluding":"2025.1.24.0","versionEndExcluding":"2025.1.26.0","matchCriteriaId":"3A6A560B-95F7-419D-8B56-7327BC2164B1"},{"vulnerable":true,"criteria":"cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:team:windows:*:*","versionStartIncluding":"2025.1.24.0","versionEndExcluding":"2025.1.26.0","matchCriteriaId":"367DF58A-9A33-46BD-AB77-74B7B8A4E48E"}]}]}],"references":[{"url":"https://devolutions.net/security/advisories/DEVO-2025-0005/","source":"security@devolutions.net","tags":["Vendor Advisory"]}]}}]}