CVE-2025-27918
Published: 06 November 2025
Summary
CVE-2025-27918 is a critical-severity Integer Overflow or Wraparound (CWE-190) vulnerability in Anydesk Anydesk. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 24.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates timely remediation of the integer overflow and heap buffer overflow flaw in AnyDesk clients by installing patches to fixed versions.
Requires validation of UDP packet inputs during AnyDesk Discovery or connection establishment to prevent integer overflows and resultant buffer overflows.
Implements memory protections such as ASLR and DEP to prevent arbitrary code execution from the heap-based buffer overflow triggered by malformed UDP packets.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated remote code execution via crafted UDP packet to AnyDesk client discovery feature or connection establishment directly enables exploitation of a public-facing application.
NVD Description
An issue was discovered in AnyDesk for Windows before 9.0.5, AnyDesk for macOS before 9.0.1, AnyDesk for Linux before 7.0.0, AnyDesk for iOS before 7.1.2, and AnyDesk for Android before 8.0.0. It has an integer overflow and resultant heap-based buffer…
more
overflow via a UDP packet during processing of an Identity user image within the Discovery feature, or when establishing a connection between any two clients.
Deeper analysisAI
CVE-2025-27918 is an integer overflow vulnerability (CWE-190) that leads to a heap-based buffer overflow in multiple AnyDesk client versions. It affects AnyDesk for Windows prior to 9.0.5, macOS prior to 9.0.1, Linux prior to 7.0.0, iOS prior to 7.1.2, and Android prior to 8.0.0. The flaw occurs when processing a malicious UDP packet containing an Identity user image in the Discovery feature or during connection establishment between clients, earning a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Any unauthenticated attacker on the network can exploit this remotely with low complexity and no user interaction by sending a crafted UDP packet to a vulnerable AnyDesk client. Successful exploitation enables arbitrary code execution with high confidentiality, integrity, and availability impacts, potentially allowing full remote control of the affected system.
Mitigation requires updating to the fixed versions: AnyDesk for Windows 9.0.5 or later, macOS 9.0.1 or later, Linux 7.0.0 or later, iOS 7.1.2 or later, and Android 8.0.0 or later. Details on patches are available in the AnyDesk Windows changelog at https://anydesk.com/en/changelog/windows, with additional technical analysis in the report at https://dspace.cvut.cz/bitstream/handle/10467/122721/F8-DP-2025-Krejsa-Vojtech-DP_Krejsa_Vojtech_2025.pdf.
Details
- CWE(s)