CVE-2025-53798

6.5 MEDIUM

📋 TL;DR

A buffer over-read vulnerability in Windows Routing and Remote Access Service (RRAS) allows unauthorized attackers to read beyond allocated memory boundaries, potentially disclosing sensitive information from system memory. This affects Windows systems with RRAS enabled, particularly those configured for VPN or routing services. Attackers can exploit this over a network without authentication.

💻 Affected Systems

Products:
  • Windows Routing and Remote Access Service
Versions: Windows Server 2019, Windows Server 2022, Windows 10, Windows 11
Operating Systems: Windows
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when RRAS is enabled and configured. Default Windows installations typically do not have RRAS enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive data from system memory including credentials, encryption keys, or other process data, leading to complete system compromise through information disclosure.

🟠

Likely Case

Information disclosure of adjacent memory contents, potentially revealing system information or partial data that could aid further attacks.

🟢

If Mitigated

Limited information disclosure with no direct code execution, but still revealing system state information.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires network access to RRAS service. No authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Microsoft Security Update Guide for specific KB numbers

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53798

Restart Required: Yes

Instructions:

1. Apply latest Windows security updates from Microsoft Update. 2. Ensure RRAS service is restarted after patch installation. 3. Verify patch installation via Windows Update history.

🔧 Temporary Workarounds

Disable RRAS Service

Windows

Temporarily disable Routing and Remote Access Service if not required

sc config RemoteAccess start= disabled
net stop RemoteAccess

Network Segmentation

Windows

Restrict network access to RRAS service using firewall rules

netsh advfirewall firewall add rule name="Block RRAS" dir=in action=block protocol=TCP localport=1723,1701,47,50,51
netsh advfirewall firewall add rule name="Block RRAS UDP" dir=in action=block protocol=UDP localport=500,4500

🧯 If You Can't Patch

  • Disable RRAS service if not required for business operations
  • Implement strict network segmentation and firewall rules to limit access to RRAS service

🔍 How to Verify

Check if Vulnerable:

Check if RRAS service is running: sc query RemoteAccess | findstr RUNNING

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify Windows Update history for the specific security update KB number

📡 Detection & Monitoring

Log Indicators:

  • Unusual RRAS service restarts
  • Failed authentication attempts to RRAS
  • Multiple connection attempts to RRAS ports

Network Indicators:

  • Unusual traffic patterns to RRAS ports (1723, 1701, 47, 50, 51, 500, 4500)
  • Multiple connection attempts from single source

SIEM Query:

source="windows" AND (event_id=4625 OR event_id=4776) AND service_name="RemoteAccess"

🔗 References

📤 Share & Export