CVE-2025-33066

| EUVD-2025-17776 HIGH
2025-06-10 [email protected]
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 19:49 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 19:49 euvd
EUVD-2025-17776
CVE Published
Jun 10, 2025 - 17:22 nvd
HIGH 8.8

Description

Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.

Analysis

Heap-based buffer overflow vulnerability in Windows Routing and Remote Access Service (RRAS) that allows unauthenticated remote attackers to execute arbitrary code over the network with user interaction. This is a critical network-accessible vulnerability affecting Windows systems running RRAS; successful exploitation grants the attacker complete system compromise with high confidentiality, integrity, and availability impact. The CVSS 8.8 score reflects the severity, though real-world exploitation probability and active KEV status would determine if this is actively weaponized.

Technical Context

The vulnerability exists in the Windows Routing and Remote Access Service (RRAS), a core Windows networking component that handles remote access protocols including RAS (Remote Access Service), VPN, and routing functionality. The root cause is a heap-based buffer overflow (CWE-122), which occurs when the RRAS service fails to properly validate input length before writing data to a heap-allocated buffer. This memory corruption can be leveraged to overwrite adjacent heap structures, enabling arbitrary code execution in the RRAS service context (typically SYSTEM privilege level). The affected component likely processes remote authentication requests, configuration data, or protocol-specific packets without adequate bounds checking. RRAS typically operates on ports 443 (HTTPS), 1194 (OpenVPN), 1723 (PPTP), and 500/4500 (IPSec), making it directly accessible from network sources without local access requirements.

Affected Products

Windows Routing and Remote Access Service (RRAS) is a built-in Windows component present in Windows Server 2019, Windows Server 2022, Windows 11, Windows 10, and likely earlier versions. Specific CPE would be: cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* (multiple Windows versions), with RRAS as a service component. Organizations running RRAS for VPN, remote access, or routing services are affected. This includes: enterprise environments with Windows-based RAS/VPN gateways, small business servers running remote access, and any Windows system with RRAS role/feature enabled. Affected versions likely span multiple Windows releases; specific patched versions would be listed in Microsoft Security Bulletin or Windows Update metadata (not provided in this CVE data).

Remediation

1. **Immediate**: Disable RRAS if not actively required; use 'Services.msc' to stop 'Remote Access Auto Connection Manager' and 'Routing and Remote Access' services. 2. **Patching**: Install Windows Update patches from Microsoft security bulletin (CVE-2025-33066 patch); specifics depend on Windows version (Server 2019, Server 2022, Windows 10/11 have distinct patch KB numbers). 3. **Network Mitigation**: Implement network-level access controls restricting RRAS ports (443, 1194, 1723, 500/4500) to trusted networks only; deploy WAF/IDS rules to detect heap overflow exploitation patterns if RRAS must remain exposed. 4. **Workaround**: If patching is delayed, disable RRAS and migrate to alternative VPN solutions (Azure VPN Gateway, third-party VPN appliances) or restrict RAS access to internal networks only. 5. **Monitoring**: Enable RRAS auditing and monitor for suspicious authentication attempts or service crashes that may indicate exploitation attempts.

Priority Score

44
Low Medium High Critical
KEV: 0
EPSS: +0.4
CVSS: +44
POC: 0

Share

CVE-2025-33066 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy