CVE-2026-25172

HIGH
2026-03-10 [email protected]
8.0
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
PoC Detected
Mar 13, 2026 - 19:54 vuln.today
Public exploit code
Analysis Generated
Mar 12, 2026 - 21:55 vuln.today
CVE Published
Mar 10, 2026 - 18:18 nvd
HIGH 8.0

Description

Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.

Analysis

Remote code execution in Windows Routing and Remote Access Service (RRAS) across Windows Server 2012, 2022, and 2022 23h2 stems from an integer overflow vulnerability that authenticated network attackers can exploit with user interaction. Public exploit code exists for this vulnerability, enabling attackers to achieve arbitrary code execution with high impact on confidentiality, integrity, and availability. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Identify and inventory all systems running RRAS; restrict network access to RRAS ports (typically TCP/UDP 1194, 1723) to trusted networks only; enable enhanced monitoring and logging. Within 7 days: Implement network segmentation to isolate RRAS servers; deploy IDS/IPS signatures to detect exploitation attempts; conduct urgent security assessment of RRAS-exposed systems. …

Sign in for detailed remediation steps.

Priority Score

60
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +40
POC: +20

Share

CVE-2026-25172 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy