Express VPN has issued a new patch for its Windows app to close a risk that can leave a remote desktop traffic unsafe. If you use Express VPN on Windows, download version 12.101.0.45 as soon as possible, especially if you use any other traffic through a remote desktop protocol (RDP) or TCP Port 3389.
Express VPN announced both danger and fix in a blog post earlier this week. According to this post, an independent researcher from ADAM-X sent a tip on April 25 to claim the prize from the Express VPN’s Big Grace program. Adam-X saw that some internal debug code that had left traffic at TCP Port 3389 had mistakenly sent users. Express VPN released the patch about five days after Windows version 12.101.0.45.
As Express VPN has identified its own announcement of the patch, it is unlikely that the threat was exploited. Not only will any hypothetical hacker be aware of this flaw, but then it will have to activate his target in sending a web application to RDP or other traffic using Port 3389. Even if all the domain fell, the hacker can only see the original IP address of his target, not one of the original data he transmitted.
Even if the risk was small, it was nice to see that Express VPN responding actively to the flaws in its products – Big Bonts are very good, but a security product should protect its customers with maximum safety measures. In addition to closing this weakness, they are also adding automatic tests that check the debug code that is accidentally left in production bloods. In addition, in 2025, a successful audit of a successful free privacy, gives a strong impression of a provider that is at the top of things.
If you buy something through a link in this article, we can get a commission.


