CVE-2025-55700

6.5 MEDIUM

📋 TL;DR

An out-of-bounds read vulnerability in Windows Routing and Remote Access Service (RRAS) allows unauthorized attackers to read memory contents over the network, potentially exposing sensitive information. This affects Windows systems with RRAS enabled, particularly those configured for VPN or routing services.

💻 Affected Systems

Products:
  • Windows Routing and Remote Access Service
Versions: Specific Windows versions as listed in Microsoft advisory
Operating Systems: Windows Server, Windows Client versions with RRAS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when RRAS service is enabled and configured

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive memory contents including credentials, encryption keys, or other system data, leading to further compromise.

🟠

Likely Case

Information disclosure of random memory contents, potentially revealing system state or configuration details.

🟢

If Mitigated

Limited information exposure with no direct code execution or system compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Network-based attack requiring no authentication but specific knowledge of RRAS protocols

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Microsoft Security Update for specific KB number

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-55700

Restart Required: Yes

Instructions:

1. Apply latest Windows security updates via Windows Update or WSUS. 2. Verify RRAS service restarts automatically after update. 3. Test VPN/routing functionality.

🔧 Temporary Workarounds

Disable RRAS if not needed

Windows

Turn off Routing and Remote Access Service if VPN/routing functionality is not required

sc config RemoteAccess start= disabled
net stop RemoteAccess

Network segmentation

all

Restrict network access to RRAS ports (TCP 1723, UDP 1701, etc.) to trusted networks only

🧯 If You Can't Patch

  • Implement strict network access controls to RRAS services
  • Monitor RRAS logs for unusual connection attempts or memory access patterns

🔍 How to Verify

Check if Vulnerable:

Check if RRAS service is running and Windows version matches affected versions in Microsoft advisory

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify Windows Update history contains the relevant security update and RRAS service version

📡 Detection & Monitoring

Log Indicators:

  • Unusual RRAS service errors
  • Memory access violations in Event Viewer
  • Failed authentication attempts to RRAS

Network Indicators:

  • Unusual traffic patterns to RRAS ports
  • Multiple connection attempts from single sources

SIEM Query:

source="Windows Security" AND (event_id=4625 OR event_id=4688) AND process_name="svchost.exe" AND service_name="RemoteAccess"

🔗 References

📤 Share & Export