Update

AnyDeskAnyDesk Software

AnyDesk

to version 9.6.5

View all applications
Patching for Windows Mac Linux

CVE Vulnerabilities for AnyDesk

CVEPublishedSeverityDetailsExploitabilityImpact Vector
CVE‑2025‑279192025‑11‑06 18:15:41HIGH (8)An issue was discovered in AnyDesk through 9.0.4. A remotely connected user with the "Control my device" permission can manipulate remote AnyDesk settings and create a password for the Full Access profile without needing confirmation from the counterparty. Consequently, the attacker can later connect without this counterparty confirmation.44NETWORK
CVE‑2025‑279182025‑11‑06 18:15:41CRITICAL (10)An issue was discovered in AnyDesk before 9.0.0. It has an integer overflow and resultant heap-based buffer overflow via a UDP packet during processing of an Identity user image within the Discovery feature, or when establishing a connection between any two clients.46NETWORK
CVE‑2025‑279172025‑11‑06 18:15:41HIGH (8)An issue was discovered in AnyDesk through 9.0.4. Remote Denial of Service can occur because of incorrect deserialization that results in failed memory allocation and a NULL pointer dereference.44NETWORK
CVE‑2025‑279162025‑11‑06 18:15:40HIGH (8)An issue was discovered in AnyDesk through 9.0.4. When the connection between two clients is established via an IP address, it is possible to manipulate the data and spoof the AnyDesk ID.44NETWORK
CVE‑2024‑127542024‑12‑30 17:15:07HIGH (8)AnyDesk Link Following Information Disclosure Vulnerability. This vulnerability allows local attackers to disclose sensitive information on affected installations of AnyDesk. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of background images. By creating a junction, an attacker can abuse the service to read arbitrary files. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-23940.44NETWORK
CVE‑2023‑265092023‑07‑03 15:15:10HIGH (8)AnyDesk 7.0.8 allows remote Denial of Service.44NETWORK
CVE‑2022‑324502022‑07‑18 13:15:10HIGH (7)AnyDesk 7.0.9 allows a local user to gain SYSTEM privileges via a symbolic link because the user can write to their own %APPDATA% folder (used for ad.trace and chat) but the product runs as SYSTEM when writing chat-room data there.25LOCAL
CVE‑2021‑444262022‑09‑12 21:15:09HIGH (9)An issue was discovered in AnyDesk before 6.2.6 and 6.3.x before 6.3.5. An upload of an arbitrary file to a victim's local ~/Downloads/ directory is possible if the victim is using the AnyDesk Windows client to connect to a remote machine, if an attacker is also connected remotely with AnyDesk to the same remote machine. The upload is done without any approval or action taken by the victim.36NETWORK
CVE‑2021‑444252022‑09‑12 21:15:09MEDIUM (7)An issue was discovered in AnyDesk before 6.2.6 and 6.3.x before 6.3.3. An unnecessarily open listening port on a machine in the LAN of an attacker, opened by the Anydesk Windows client when using the tunneling feature, allows the attacker unauthorized access to the local machine's AnyDesk tunneling protocol stack (and also to any remote destination machine software that is listening to the AnyDesk tunneled port).34ADJACENT_NETWORK
CVE‑2021‑408542021‑10‑14 05:15:08HIGH (8)AnyDesk before 6.2.6 and 6.3.x before 6.3.3 allows a local user to obtain administrator privileges by using the Open Chat Log feature to launch a privileged Notepad process that can launch other applications.26LOCAL
CVE‑2020‑354832021‑01‑11 15:15:13HIGH (8)AnyDesk before 6.1.0 on Windows, when run in portable mode on a system where the attacker has write access to the application directory, allows this attacker to compromise a local user account via a read-only setting for a Trojan horse gcapi.dll file.26LOCAL
CVE‑2020‑276142020‑12‑09 00:15:13HIGH (8)AnyDesk for macOS versions 6.0.2 and older have a vulnerability in the XPC interface that does not properly validate client requests and allows local privilege escalation.26LOCAL
CVE‑2020‑131602020‑06‑09 17:15:10CRITICAL (10)AnyDesk before 5.5.3 on Linux and FreeBSD has a format string vulnerability that can be exploited for remote code execution.46NETWORK
CVE‑2018‑131022018‑07‑03 16:29:00MEDIUM (7)AnyDesk before "12.06.2018 - 4.1.3" on Windows 7 SP1 has a DLL preloading vulnerability.00NETWORK
CVE‑2017‑143972017‑09‑12 21:29:00HIGH (8)AnyDesk before 3.6.1 on Windows has a DLL injection vulnerability.00NETWORK

Deep Windows, Mac, and Linux OS patching

Stay out of the "Negligent MSP" label because Lavawall® covers:
  • 30-312 times as many applications as popular RMMs.
  • "optional" Windows patches, including firmware and drivers
  • Mac OS and application patches
  • Linux Kernel, OS, and package patches for more distribution types than we want to admit exist
Select the operating system you care about to find how Lavawall takes care of Operating System, driver, and application patches.
Windows Mac Linux

What applications does Lavawall® monitor?

Lavawall monitors patches for over 7,500 applications. This is a summary of the most popular applications.
Click here for the full list.
Click the applications below for the current version and known vulnerabilities.
Logos are property of their respective trademark holders and are not affiliated with ThreeShield or Lavawall. We have not audited the security of most of the listed tools.
Logos, products, trade names, and company names are all the property of their respective trademark holders.
The above listing includes products that Lavawall® monitors through public information and/or proprietary statistical analysis.
Although we do have a partner relationship with some of the listed products and companies, they do not necessarily endorse Lavawall® or have integrations with our systems.