Due to improper TLS certificate validation in the DeskTime Time Tracking App before version 1.3.674, attackers who can position themselves in the network path between the client and the DeskTime update servers can return a malicious executable in response to an update request. This allows the attacker to achieve user-level remote code execution on the affected client.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://desktime.com/download |
|
| https://r.sec-consult.com/desktime |
|
History
Tue, 28 Apr 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Due to improper TLS certificate validation in the DeskTime Time Tracking App before version 1.3.674, attackers who can position themselves in the network path between the client and the DeskTime update servers can return a malicious executable in response to an update request. This allows the attacker to achieve user-level remote code execution on the affected client. | |
| Title | Improper TLS Certificate Validation RCE via Malicious Update in DeskTime Time Tracking App | |
| Weaknesses | CWE-295 CWE-296 CWE-494 |
|
| References |
|
Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2026-04-28T07:52:23.279Z
Reserved: 2025-09-16T07:39:47.680Z
Link: CVE-2025-10539
No data.
Status : Received
Published: 2026-04-28T09:16:16.187
Modified: 2026-04-28T09:16:16.187
Link: CVE-2025-10539
No data.
OpenCVE Enrichment
No data.