CVE-2025-53720

Microsoft · Microsoft Windows Routing and Remote Access Service (RRAS)

A high-severity vulnerability has been identified in the Windows Routing and Remote Access Service (RRAS), a common networking component in Windows servers.

Executive summary

A high-severity vulnerability has been identified in the Windows Routing and Remote Access Service (RRAS), a common networking component in Windows servers. An attacker who is already authorized on the network could exploit this flaw to execute malicious code and gain full control of the affected server. Successful exploitation could lead to a significant network breach, data theft, or service disruption.

Vulnerability

The vulnerability is a heap-based buffer overflow within the Windows RRAS. An attacker with valid credentials who can send traffic to the service can exploit this by sending a specially crafted network packet. This packet contains more data than the service's buffer is designed to handle, causing the excess data to overwrite adjacent memory on the heap, which can lead to memory corruption and allows the attacker to execute arbitrary code with the permissions of the RRAS service, typically SYSTEM-level privileges.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8. Exploitation could lead to a complete compromise of the affected RRAS server, which often acts as a critical network infrastructure component such as a VPN gateway or router. The business impact includes the potential for an attacker to gain a persistent foothold within the corporate network, intercept sensitive data traversing the network, pivot to other internal systems, or cause a denial-of-service condition by crashing the service. This represents a significant risk to the confidentiality, integrity, and availability of the organization's network infrastructure and the data it protects.

Remediation

Immediate Action: Apply the security updates released by the vendor (Microsoft) to all affected servers immediately. Prioritization should be given to internet-facing RRAS servers, such as VPN concentrators. Concurrently, monitor network traffic and system logs for any signs of exploitation attempts as described below.

Proactive Monitoring: Security teams should monitor for unexpected crashes or restarts of the RRAS service (RemoteAccess) or its hosting svchost.exe process. Review Windows Event Logs (System, Security, and Application) for anomalous errors or warnings related to the RRAS service. Network monitoring should be configured to detect unusual traffic patterns or connections to the RRAS server from unexpected internal or external sources.

Compensating Controls: If patching cannot be immediately deployed, implement network-level access controls to restrict communication with the RRAS service to only trusted IP addresses and authorized administrative subnets. Utilize host-based firewalls to enforce these rules directly on the server. Ensure that only a minimum number of privileged accounts have the rights to manage and interact with the RRAS service to limit the pool of potential authorized attackers.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high severity (CVSS 8) and the risk of complete system compromise, this vulnerability requires immediate attention. Although CVE-2025-53720 is not currently listed on the CISA KEV catalog, its potential impact on critical network infrastructure is significant. We strongly recommend that organizations prioritize the deployment of the vendor-supplied patches to all affected systems, starting with internet-exposed servers. Until patching is complete, the implementation of compensating controls and enhanced monitoring is crucial to mitigate risk and detect potential exploitation attempts.