Due to improper TLS certificate validation in the DeskTime Time Tracking App before version 1.3.674, attackers who can position themselves in the network path between the client and the DeskTime update servers can return a malicious executable in response to an update request. This allows the attacker to achieve user-level remote code execution on the affected client.
Advisories

No advisories yet.

Fixes

Solution

The vendor provides a patched version v1.3.674 which can be obtained from: https://desktime.com/download


Workaround

No workaround given by the vendor.

History

Tue, 28 Apr 2026 09:15:00 +0000

Type Values Removed Values Added
Description Due to improper TLS certificate validation in the DeskTime Time Tracking App before version 1.3.674, attackers who can position themselves in the network path between the client and the DeskTime update servers can return a malicious executable in response to an update request. This allows the attacker to achieve user-level remote code execution on the affected client.
Title Improper TLS Certificate Validation RCE via Malicious Update in DeskTime Time Tracking App
Weaknesses CWE-295
CWE-296
CWE-494
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2026-04-28T07:52:23.279Z

Reserved: 2025-09-16T07:39:47.680Z

Link: CVE-2025-10539

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-28T09:16:16.187

Modified: 2026-04-28T09:16:16.187

Link: CVE-2025-10539

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses