Due to improper TLS certificate validation in the DeskTime Time Tracking App before version 1.3.674, attackers who can position themselves in the network path between the client and the DeskTime update servers can return a malicious executable in response to an update request. This allows the attacker to achieve user-level remote code execution on the affected client.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
The vendor provides a patched version v1.3.674 which can be obtained from: https://desktime.com/download
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://desktime.com/download |
|
| https://r.sec-consult.com/desktime |
|
History
Tue, 28 Apr 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Due to improper TLS certificate validation in the DeskTime Time Tracking App before version 1.3.674, attackers who can position themselves in the network path between the client and the DeskTime update servers can return a malicious executable in response to an update request. This allows the attacker to achieve user-level remote code execution on the affected client. | |
| Title | Improper TLS Certificate Validation RCE via Malicious Update in DeskTime Time Tracking App | |
| Weaknesses | CWE-295 CWE-296 CWE-494 |
|
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2026-04-28T07:52:23.279Z
Reserved: 2025-09-16T07:39:47.680Z
Link: CVE-2025-10539
No data.
Status : Received
Published: 2026-04-28T09:16:16.187
Modified: 2026-04-28T09:16:16.187
Link: CVE-2025-10539
No data.
OpenCVE Enrichment
No data.