CVE-2025-54113

Windows · Windows Routing and Remote Access Service (RRAS)

A critical vulnerability exists in the Windows Routing and Remote Access Service (RRAS) that could allow an unauthenticated attacker to take full control of an affected system over the network.

Executive summary

A critical vulnerability exists in the Windows Routing and Remote Access Service (RRAS) that could allow an unauthenticated attacker to take full control of an affected system over the network. This heap-based buffer overflow flaw enables remote code execution, posing a significant risk of data breach, system compromise, and further network intrusion. Organizations are urged to apply security updates immediately to mitigate this high-severity threat.

Vulnerability

This vulnerability is a heap-based buffer overflow within the Windows Routing and Remote Access Service (RRAS). An unauthenticated attacker can exploit this flaw by sending a specially crafted network packet to a server running the vulnerable RRAS service. Successful exploitation overwrites memory structures on the heap, leading to arbitrary code execution with the privileges of the RRAS service, which typically runs with high-level system permissions.

Business impact

This vulnerability is classified as a High severity with a CVSS score of 8.8. A successful exploit could have severe consequences for the business, allowing an attacker to achieve a complete system compromise. The potential impacts include the theft of sensitive data, deployment of ransomware, disruption of critical network services like VPN access, and using the compromised server as a foothold to launch further attacks against the internal network. Given that RRAS is often deployed on internet-facing servers, this vulnerability represents a critical risk to the network perimeter.

Remediation

Immediate Action: Apply vendor security updates immediately across all affected systems. After patching, monitor for any post-patch exploitation attempts and review system and network access logs for any indicators of compromise that may have occurred prior to remediation.

Proactive Monitoring: Implement enhanced monitoring for RRAS servers. Look for crashes in the RRAS service (svchost.exe hosting RemoteAccess) within Windows Event Logs. Monitor network traffic for unusual or malformed packets directed at RRAS ports and configure IDS/IPS systems with relevant signatures once they become available.

Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce the attack surface. Use a firewall or network access control lists (ACLs) to strictly limit network access to the RRAS service to only trusted IP addresses. If the service is not business-critical, consider disabling it entirely until a patch can be applied.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the critical CVSS score of 8.8 and the potential for complete system compromise, organizations must treat this vulnerability with the highest priority. The primary recommendation is to apply the vendor-supplied security patches without delay, especially on internet-facing servers. Although not yet listed in the CISA KEV catalog, its characteristics make it an attractive target for exploitation. If patching is delayed, the compensating controls outlined above should be implemented immediately to mitigate risk.