CVE-2025-29830
📋 TL;DR
CVE-2025-29830 is an information disclosure vulnerability in Windows Routing and Remote Access Service (RRAS) where uninitialized memory resources can leak sensitive data over the network. Attackers can exploit this to obtain potentially valuable system information without authentication. Organizations running Windows servers with RRAS enabled are affected.
💻 Affected Systems
- Windows Server
📦 What is this software?
Windows 10 1507 by Microsoft
Windows 10 1507 by Microsoft
Windows 10 1607 by Microsoft
Windows 10 1607 by Microsoft
Windows 10 1809 by Microsoft
Windows 10 1809 by Microsoft
Windows 10 21h2 by Microsoft
Windows 10 21h2 by Microsoft
Windows 10 21h2 by Microsoft
Windows 10 22h2 by Microsoft
Windows 10 22h2 by Microsoft
Windows 10 22h2 by Microsoft
Windows 11 22h2 by Microsoft
Windows 11 22h2 by Microsoft
Windows 11 23h2 by Microsoft
Windows 11 23h2 by Microsoft
Windows 11 24h2 by Microsoft
Windows 11 24h2 by Microsoft
⚠️ Risk & Real-World Impact
Worst Case
An attacker could obtain sensitive system information, configuration details, or memory contents that could facilitate further attacks or reconnaissance.
Likely Case
Information disclosure of system state or configuration data that could aid attackers in planning subsequent attacks.
If Mitigated
Limited impact with proper network segmentation and access controls preventing unauthorized network access to RRAS services.
🎯 Exploit Status
Exploitation requires network access to RRAS service and knowledge of vulnerable endpoints.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Microsoft Security Update Guide for specific patch versions
Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29830
Restart Required: Yes
Instructions:
1. Check Microsoft Security Update Guide for applicable patches
2. Apply Windows Server security updates through Windows Update
3. Restart affected systems to complete installation
🔧 Temporary Workarounds
Disable RRAS Service
windowsTemporarily disable Routing and Remote Access Service if not required
sc config RemoteAccess start= disabled
net stop RemoteAccess
Network Segmentation
windowsRestrict network access to RRAS services using firewall rules
New-NetFirewallRule -DisplayName "Block RRAS" -Direction Inbound -Protocol TCP -LocalPort 1723 -Action Block
🧯 If You Can't Patch
- Implement strict network access controls to limit who can reach RRAS services
- Monitor RRAS service logs for unusual access patterns or information disclosure attempts
🔍 How to Verify
Check if Vulnerable:
Check if RRAS service is running and verify Windows Server version against patched versions in Microsoft advisory
Check Version:
systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
Verify Fix Applied:
Verify Windows Update history shows the security patch installed and RRAS service version updated
📡 Detection & Monitoring
Log Indicators:
- Unusual RRAS service access from unauthorized sources
- Multiple failed connection attempts to RRAS
Network Indicators:
- Unusual traffic patterns to RRAS ports (typically 1723 for PPTP)
- Information disclosure patterns in network traffic
SIEM Query:
source="windows" AND service="RemoteAccess" AND (event_id=201 OR event_id=202) AND src_ip NOT IN [allowed_ips]