Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 05 Mar 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:anydesk:anydesk:9.0.1:*:*:*:*:*:*:* |
Tue, 16 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 12 Dec 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Anydesk
Anydesk anydesk |
|
| Vendors & Products |
Anydesk
Anydesk anydesk |
Thu, 11 Dec 2025 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AnyDesk 7.0.15 and 9.0.1 contains an unquoted service path vulnerability that allows local non-privileged users to potentially execute code with elevated SYSTEM privileges. Attackers can exploit the unquoted service path configuration to inject malicious executables that will be run with high-level system permissions. | |
| Title | AnyDesk 9.0.1 Unquoted Service Path Privilege Escalation Vulnerability | |
| Weaknesses | CWE-428 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-05T12:04:27.120Z
Reserved: 2025-04-15T19:15:22.611Z
Link: CVE-2025-34499
Updated: 2025-12-16T16:22:04.939Z
Status : Deferred
Published: 2025-12-11T22:15:53.430
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-34499
No data.
OpenCVE Enrichment
Updated: 2025-12-12T08:48:38Z