CVE-2025-33054
Published: 08 July 2025
Summary
CVE-2025-33054 is a high-severity Insufficient UI Warning of Dangerous Operations (CWE-357) vulnerability in Microsoft Windows 11 22H2. Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Remote Desktop Protocol (T1021.001); ranked in the top 22.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-17 (Remote Access) and SC-11 (Trusted Path).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
AC-17 requires protections against spoofing for remote access, directly mitigating the network-based spoofing enabled by insufficient UI warnings in the Remote Desktop Client.
SC-11 establishes a trusted path that prevents spoofing over remote connections, addressing the UI spoofing vulnerability in RDP sessions.
SC-23 ensures the authenticity of remote sessions, countering the spoofing attack that exploits poor UI warnings in the Remote Desktop Client.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability in RDP client UI warnings directly enables spoofing/MitM-style abuse of Remote Desktop Protocol connections via user interaction.
NVD Description
Insufficient UI warning of dangerous operations in Remote Desktop Client allows an unauthorized attacker to perform spoofing over a network.
Deeper analysisAI
CVE-2025-33054 is a vulnerability involving insufficient UI warnings for dangerous operations in the Remote Desktop Client. This flaw allows an unauthorized attacker to perform spoofing over a network. Published on 2025-07-08T17:15:34.063, it is associated with CWE-357 and carries a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N).
The vulnerability can be exploited by an unauthorized attacker over the network with low attack complexity and no privileges required, though it necessitates user interaction. Successful exploitation enables the attacker to compromise confidentiality and integrity at a high level, with no impact on availability.
Microsoft's update guide provides details on mitigation for CVE-2025-33054, available at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33054.
Details
- CWE(s)