CVE-2025-49757

Microsoft · Microsoft Windows Routing and Remote Access Service (RRAS)

A critical vulnerability has been discovered in the Windows Routing and Remote Access Service (RRAS), a common component used for network management and VPNs.

Executive summary

A critical vulnerability has been discovered in the Windows Routing and Remote Access Service (RRAS), a common component used for network management and VPNs. This flaw allows an unauthenticated attacker on the network to remotely execute arbitrary code, potentially leading to a complete system compromise. Organizations are urged to take immediate action to patch affected systems to prevent unauthorized access and control.

Vulnerability

The vulnerability is a heap-based buffer overflow within the Windows RRAS. An unauthenticated attacker can exploit this by sending a specially crafted network packet to an affected server. The service fails to properly validate the size of the input data, allowing the packet to write beyond the intended memory buffer on the heap, which can overwrite critical data structures and lead to the execution of attacker-supplied code with the privileges of the RRAS service.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8. Successful exploitation could have a severe impact on the business, granting an attacker a direct foothold into the corporate network. An attacker could leverage this access to install ransomware, exfiltrate sensitive data, disrupt network services, or pivot to other critical systems within the internal network. Since RRAS is often deployed on edge-facing servers for VPN access, a compromise could lead to a significant breach of the entire network perimeter.

Remediation

Immediate Action: Apply the security updates provided by the vendor to all affected Windows servers immediately, prioritizing internet-facing systems running the RRAS service. After patching, it is crucial to continue monitoring for any signs of exploitation attempts that may have occurred prior to remediation and to review RRAS and system access logs for any anomalous activity.

Proactive Monitoring: Security teams should monitor network traffic to and from RRAS servers for malformed packets or unusual connection patterns. Review Windows Event Logs for RRAS service crashes or errors (Event IDs related to RemoteAccess). Utilize Endpoint Detection and Response (EDR) solutions to monitor for suspicious child processes spawning from the RRAS service process (svchost.exe).

Compensating Controls: If immediate patching is not feasible, restrict access to RRAS-related ports (e.g., TCP/1723 for PPTP, UDP/500 and UDP/4500 for IKEv2/IPsec) at the network firewall to only trusted IP addresses. If the RRAS role is not essential for a server's function, disable or uninstall the service to completely remove the attack surface.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score of 8.8 and the risk of unauthenticated remote code execution, this vulnerability represents a critical threat. We strongly recommend that organizations treat this with the utmost urgency and adhere to the vendor's guidance to patch all vulnerable systems immediately. Although this CVE is not currently on the CISA KEV list, its characteristics make it a prime candidate for future inclusion. Proactive patching is the most effective defense against potential exploitation.