Due to improper TLS certificate validation in the DeskTime Time Tracking App before version 1.3.674, attackers who can position themselves in the network path between the client and the DeskTime update servers can return a malicious executable in response to an update request. This allows the attacker to achieve user-level remote code execution on the affected client.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

The vendor provides a patched version v1.3.674 which can be obtained from: https://desktime.com/download


Workaround

No workaround given by the vendor.

History

Tue, 28 Apr 2026 15:15:00 +0000


Tue, 28 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 28 Apr 2026 09:15:00 +0000

Type Values Removed Values Added
Description Due to improper TLS certificate validation in the DeskTime Time Tracking App before version 1.3.674, attackers who can position themselves in the network path between the client and the DeskTime update servers can return a malicious executable in response to an update request. This allows the attacker to achieve user-level remote code execution on the affected client.
Title Improper TLS Certificate Validation RCE via Malicious Update in DeskTime Time Tracking App
Weaknesses CWE-295
CWE-296
CWE-494
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2026-04-28T14:10:50.831Z

Reserved: 2025-09-16T07:39:47.680Z

Link: CVE-2025-10539

cve-icon Vulnrichment

Updated: 2026-04-28T14:09:38.312Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-28T09:16:16.187

Modified: 2026-04-28T20:23:20.703

Link: CVE-2025-10539

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T19:30:27Z

Weaknesses