CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Tags
Description
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
Analysis
Heap-based buffer overflow vulnerability in Windows Routing and Remote Access Service (RRAS) that allows unauthenticated remote attackers to execute arbitrary code over the network with user interaction. This is a critical network-accessible vulnerability affecting Windows systems running RRAS; successful exploitation grants the attacker complete system compromise with high confidentiality, integrity, and availability impact. The CVSS 8.8 score reflects the severity, though real-world exploitation probability and active KEV status would determine if this is actively weaponized.
Technical Context
The vulnerability exists in the Windows Routing and Remote Access Service (RRAS), a core Windows networking component that handles remote access protocols including RAS (Remote Access Service), VPN, and routing functionality. The root cause is a heap-based buffer overflow (CWE-122), which occurs when the RRAS service fails to properly validate input length before writing data to a heap-allocated buffer. This memory corruption can be leveraged to overwrite adjacent heap structures, enabling arbitrary code execution in the RRAS service context (typically SYSTEM privilege level). The affected component likely processes remote authentication requests, configuration data, or protocol-specific packets without adequate bounds checking. RRAS typically operates on ports 443 (HTTPS), 1194 (OpenVPN), 1723 (PPTP), and 500/4500 (IPSec), making it directly accessible from network sources without local access requirements.
Affected Products
Windows Routing and Remote Access Service (RRAS) is a built-in Windows component present in Windows Server 2019, Windows Server 2022, Windows 11, Windows 10, and likely earlier versions. Specific CPE would be: cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* (multiple Windows versions), with RRAS as a service component. Organizations running RRAS for VPN, remote access, or routing services are affected. This includes: enterprise environments with Windows-based RAS/VPN gateways, small business servers running remote access, and any Windows system with RRAS role/feature enabled. Affected versions likely span multiple Windows releases; specific patched versions would be listed in Microsoft Security Bulletin or Windows Update metadata (not provided in this CVE data).
Remediation
1. **Immediate**: Disable RRAS if not actively required; use 'Services.msc' to stop 'Remote Access Auto Connection Manager' and 'Routing and Remote Access' services. 2. **Patching**: Install Windows Update patches from Microsoft security bulletin (CVE-2025-33066 patch); specifics depend on Windows version (Server 2019, Server 2022, Windows 10/11 have distinct patch KB numbers). 3. **Network Mitigation**: Implement network-level access controls restricting RRAS ports (443, 1194, 1723, 500/4500) to trusted networks only; deploy WAF/IDS rules to detect heap overflow exploitation patterns if RRAS must remain exposed. 4. **Workaround**: If patching is delayed, disable RRAS and migrate to alternative VPN solutions (Azure VPN Gateway, third-party VPN appliances) or restrict RAS access to internal networks only. 5. **Monitoring**: Enable RRAS auditing and monitor for suspicious authentication attempts or service crashes that may indicate exploitation attempts.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17776