CVE-2025-54097

6.5 MEDIUM

📋 TL;DR

An out-of-bounds read vulnerability in Windows Routing and Remote Access Service (RRAS) allows unauthorized attackers to read sensitive memory contents over the network. This affects Windows systems with RRAS enabled, potentially exposing system information or credentials. The vulnerability requires network access to the RRAS service.

💻 Affected Systems

Products:
  • Windows Routing and Remote Access Service
Versions: Specific Windows versions as listed in Microsoft advisory
Operating Systems: Windows Server and Windows Client versions with RRAS enabled
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when RRAS is enabled and configured. Default Windows installations typically do not have RRAS enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive memory contents including credentials, cryptographic keys, or other system information, potentially leading to further system compromise.

🟠

Likely Case

Information disclosure of system memory contents, which could include partial data useful for further attacks or reconnaissance.

🟢

If Mitigated

Limited information disclosure with no direct code execution or system takeover capabilities.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires network access to RRAS service and knowledge of triggering conditions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Microsoft Security Update for specific KB number

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54097

Restart Required: Yes

Instructions:

1. Apply latest Windows security updates from Microsoft. 2. Verify RRAS service is updated. 3. Restart system if required by update.

🔧 Temporary Workarounds

Disable RRAS if not needed

Windows

Disable Routing and Remote Access Service if not required for business operations

sc config RemoteAccess start= disabled
net stop RemoteAccess

Network segmentation

Windows

Restrict network access to RRAS service using firewall rules

netsh advfirewall firewall add rule name="Block RRAS" dir=in action=block protocol=TCP localport=1723,1701,47
netsh advfirewall firewall add rule name="Block RRAS UDP" dir=in action=block protocol=UDP localport=500,4500

🧯 If You Can't Patch

  • Disable RRAS service entirely if not required
  • Implement strict network access controls to limit exposure to RRAS service

🔍 How to Verify

Check if Vulnerable:

Check if RRAS is enabled and running: sc query RemoteAccess

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify Windows Update history contains the relevant security update KB number

📡 Detection & Monitoring

Log Indicators:

  • Unusual RRAS service crashes in Event Viewer
  • Multiple failed connection attempts to RRAS ports
  • Unexpected memory access patterns in RRAS logs

Network Indicators:

  • Unusual traffic patterns to RRAS ports (1723, 1701, 47, 500, 4500)
  • Multiple connection attempts from single sources

SIEM Query:

source="windows" AND (event_id=1000 OR event_id=1001) AND process_name="svchost.exe" AND service="RemoteAccess"

🔗 References

📤 Share & Export