Due to improper TLS certificate validation in the DeskTime Time Tracking App before version 1.3.674, attackers who can position themselves in the network path between the client and the DeskTime update servers can return a malicious executable in response to an update request. This allows the attacker to achieve user-level remote code execution on the affected client.
History

Tue, 28 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 28 Apr 2026 09:15:00 +0000

Type Values Removed Values Added
Description Due to improper TLS certificate validation in the DeskTime Time Tracking App before version 1.3.674, attackers who can position themselves in the network path between the client and the DeskTime update servers can return a malicious executable in response to an update request. This allows the attacker to achieve user-level remote code execution on the affected client.
Title Improper TLS Certificate Validation RCE via Malicious Update in DeskTime Time Tracking App
Weaknesses CWE-295
CWE-296
CWE-494
References

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2026-04-28T14:10:50.831Z

Reserved: 2025-09-16T07:39:47.680Z

Link: CVE-2025-10539

cve-icon Vulnrichment

Updated: 2026-04-28T14:09:38.312Z

cve-icon NVD

Status : Received

Published: 2026-04-28T09:16:16.187

Modified: 2026-04-28T09:16:16.187

Link: CVE-2025-10539

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.