Project Subscriptions
No data.
No advisories yet.
Solution
The vendor provides a patched version v1.3.674 which can be obtained from: https://desktime.com/download
Workaround
No workaround given by the vendor.
Tue, 28 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 28 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 28 Apr 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Due to improper TLS certificate validation in the DeskTime Time Tracking App before version 1.3.674, attackers who can position themselves in the network path between the client and the DeskTime update servers can return a malicious executable in response to an update request. This allows the attacker to achieve user-level remote code execution on the affected client. | |
| Title | Improper TLS Certificate Validation RCE via Malicious Update in DeskTime Time Tracking App | |
| Weaknesses | CWE-295 CWE-296 CWE-494 |
|
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2026-04-28T14:10:50.831Z
Reserved: 2025-09-16T07:39:47.680Z
Link: CVE-2025-10539
Updated: 2026-04-28T14:09:38.312Z
Status : Awaiting Analysis
Published: 2026-04-28T09:16:16.187
Modified: 2026-04-28T20:23:20.703
Link: CVE-2025-10539
No data.
OpenCVE Enrichment
Updated: 2026-04-28T19:30:27Z