CVE-2025-58717

6.5 MEDIUM

📋 TL;DR

An out-of-bounds read vulnerability in Windows Routing and Remote Access Service (RRAS) allows unauthorized attackers to read memory contents they shouldn't access, potentially exposing sensitive information. This affects Windows systems with RRAS enabled, particularly those configured for VPN or routing services.

💻 Affected Systems

Products:
  • Windows Routing and Remote Access Service
Versions: Specific Windows versions as listed in Microsoft advisory
Operating Systems: Windows Server and Client versions with RRAS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when RRAS is enabled and configured. Default Windows installations typically don't have RRAS enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive memory contents including credentials, encryption keys, or other system data, leading to further compromise of the system or network.

🟠

Likely Case

Information disclosure of system memory contents, potentially revealing configuration details or partial data that could aid in further attacks.

🟢

If Mitigated

Limited information disclosure with no direct code execution or system compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires network access to RRAS service. No authentication needed but requires specific conditions to trigger the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Microsoft Security Update for specific KB number

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58717

Restart Required: Yes

Instructions:

1. Apply latest Windows security updates from Microsoft. 2. Verify RRAS service is updated. 3. Restart system if required by the update.

🔧 Temporary Workarounds

Disable RRAS if not needed

Windows

Disable Routing and Remote Access Service if it's not required for business operations

sc config RemoteAccess start= disabled
net stop RemoteAccess

Restrict network access to RRAS

Windows

Use firewall rules to limit which systems can access RRAS ports

netsh advfirewall firewall add rule name="Block RRAS" dir=in action=block protocol=TCP localport=1723,1701,47

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate RRAS systems
  • Monitor RRAS service logs for unusual activity or connection attempts

🔍 How to Verify

Check if Vulnerable:

Check if RRAS is enabled and running, then verify Windows version against patched versions in Microsoft advisory

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify Windows Update history shows the relevant security update installed and RRAS service version

📡 Detection & Monitoring

Log Indicators:

  • Unusual RRAS service errors
  • Multiple failed connection attempts to RRAS
  • Memory access violations in system logs

Network Indicators:

  • Unusual traffic patterns to RRAS ports (1723, 1701, 47)
  • Multiple connection attempts from single sources

SIEM Query:

EventID=4625 OR EventID=4688 | where ProcessName contains "svchost" AND CommandLine contains "rras"

🔗 References

📤 Share & Export