CVE-2025-60715

Microsoft · Microsoft Windows Routing and Remote Access Service (RRAS)

A high-severity vulnerability exists within the Windows Routing and Remote Access Service (RRAS) that could allow an attacker with network access and valid credentials to take full control of an affec.

Executive summary

A high-severity vulnerability exists within the Windows Routing and Remote Access Service (RRAS) that could allow an attacker with network access and valid credentials to take full control of an affected server. Successful exploitation could lead to a complete system compromise, enabling the attacker to steal data, disrupt network services, and move deeper into the corporate network. Immediate patching is required to mitigate this critical risk.

Vulnerability

This vulnerability is a heap-based buffer overflow. An authenticated attacker can exploit this flaw by sending a specially crafted network packet to the RRAS service. The service fails to properly validate the size of the incoming data, allowing the attacker to write beyond the intended memory buffer on the heap, which can overwrite adjacent memory structures and lead to arbitrary code execution with the privileges of the RRAS service, typically SYSTEM-level.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8. A successful exploit would grant an attacker complete control over the compromised RRAS server. This could lead to severe business consequences, including the theft of sensitive data, deployment of ransomware, disruption of critical VPN and remote access services, and the ability for the attacker to use the compromised server as a pivot point for lateral movement across the entire network. The confidentiality, integrity, and availability of the network infrastructure are at significant risk.

Remediation

Immediate Action: Apply the security updates released by the vendor (Microsoft) immediately to all affected systems. Prioritize patching on internet-facing servers and critical internal infrastructure. After patching, monitor for any signs of exploitation attempts by reviewing RRAS service logs and network traffic for anomalous activity.

Proactive Monitoring: Organizations should actively monitor for indicators of compromise. This includes watching for unexpected crashes or restarts of the RRAS service (RemoteAccess), analyzing network traffic to RRAS servers for malformed packets or unusual patterns, and using SIEM/EDR solutions to detect suspicious child processes or command-line activity originating from the RRAS service process.

Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce the attack surface. Restrict network access to the RRAS service to only trusted IP addresses and authorized subnets using host-based or network firewalls. Enforce the principle of least privilege for all accounts authorized to connect to the service. Deploy a Network Intrusion Prevention System (NIPS) with signatures capable of detecting and blocking exploit attempts against this vulnerability.

Exploitation status

Public Exploit Available: false

Analyst recommendation

This vulnerability poses a critical risk to the organization's network infrastructure and must be addressed with urgency. The primary recommendation is to apply the vendor-supplied security patches to all vulnerable systems immediately, prioritizing externally-facing and critical servers. Although this CVE is not currently listed on the CISA KEV catalog, its high severity and potential for remote code execution mean it could be added if widespread exploitation is observed. Organizations must assume it will be exploited and take proactive steps to patch, monitor for suspicious activity, and apply compensating controls where patching is delayed.