CVE-2025-29830

6.5 MEDIUM

📋 TL;DR

CVE-2025-29830 is an information disclosure vulnerability in Windows Routing and Remote Access Service (RRAS) where uninitialized memory resources can leak sensitive data over the network. Attackers can exploit this to obtain potentially valuable system information without authentication. Organizations running Windows servers with RRAS enabled are affected.

💻 Affected Systems

Products:
  • Windows Server
Versions: Specific versions not yet detailed in public advisory
Operating Systems: Windows Server
Default Config Vulnerable: ✅ No
Notes: Only affects systems with Routing and Remote Access Service (RRAS) enabled and configured.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could obtain sensitive system information, configuration details, or memory contents that could facilitate further attacks or reconnaissance.

🟠

Likely Case

Information disclosure of system state or configuration data that could aid attackers in planning subsequent attacks.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing unauthorized network access to RRAS services.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires network access to RRAS service and knowledge of vulnerable endpoints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Microsoft Security Update Guide for specific patch versions

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29830

Restart Required: Yes

Instructions:

1. Check Microsoft Security Update Guide for applicable patches
2. Apply Windows Server security updates through Windows Update
3. Restart affected systems to complete installation

🔧 Temporary Workarounds

Disable RRAS Service

windows

Temporarily disable Routing and Remote Access Service if not required

sc config RemoteAccess start= disabled
net stop RemoteAccess

Network Segmentation

windows

Restrict network access to RRAS services using firewall rules

New-NetFirewallRule -DisplayName "Block RRAS" -Direction Inbound -Protocol TCP -LocalPort 1723 -Action Block

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach RRAS services
  • Monitor RRAS service logs for unusual access patterns or information disclosure attempts

🔍 How to Verify

Check if Vulnerable:

Check if RRAS service is running and verify Windows Server version against patched versions in Microsoft advisory

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify Windows Update history shows the security patch installed and RRAS service version updated

📡 Detection & Monitoring

Log Indicators:

  • Unusual RRAS service access from unauthorized sources
  • Multiple failed connection attempts to RRAS

Network Indicators:

  • Unusual traffic patterns to RRAS ports (typically 1723 for PPTP)
  • Information disclosure patterns in network traffic

SIEM Query:

source="windows" AND service="RemoteAccess" AND (event_id=201 OR event_id=202) AND src_ip NOT IN [allowed_ips]

🔗 References

📤 Share & Export