CVE-2025-59510

5.5 MEDIUM

📋 TL;DR

This vulnerability in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to create symbolic links that cause the service to access unintended files, leading to local denial of service. It affects systems running Windows with RRAS enabled. Attackers must have local authenticated access to exploit this flaw.

💻 Affected Systems

Products:
  • Windows Routing and Remote Access Service (RRAS)
Versions: Specific Windows versions as listed in Microsoft advisory
Operating Systems: Windows Server, Windows Client versions with RRAS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when RRAS is enabled and configured. Default Windows installations typically do not have RRAS enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could cause RRAS to crash or become unresponsive, disrupting network routing and remote access services on the affected system.

🟠

Likely Case

Local authenticated users could temporarily disrupt RRAS functionality, affecting VPN connections and routing services until service restart.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to temporary service disruption that can be quickly restored.

🌐 Internet-Facing: LOW - This requires local authenticated access and cannot be exploited remotely.
🏢 Internal Only: MEDIUM - Internal users with local access could disrupt critical routing services affecting network connectivity.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local authenticated access and knowledge of symbolic link techniques. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Microsoft Security Update Guide for specific KB numbers

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59510

Restart Required: Yes

Instructions:

1. Apply latest Windows security updates from Microsoft. 2. Verify RRAS service is updated. 3. Restart system if required by update.

🔧 Temporary Workarounds

Disable RRAS if not needed

windows

Disable Routing and Remote Access Service if not required for business operations

sc config RemoteAccess start= disabled
net stop RemoteAccess

Restrict local user access

windows

Implement strict access controls to limit which users can log into RRAS servers

🧯 If You Can't Patch

  • Implement strict access controls to limit local user access to RRAS servers
  • Monitor RRAS service health and implement automated restart procedures for service failures

🔍 How to Verify

Check if Vulnerable:

Check if RRAS is enabled and running, then verify Windows version against affected versions in Microsoft advisory

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify Windows Update history for relevant security patches and confirm RRAS service version

📡 Detection & Monitoring

Log Indicators:

  • RRAS service crashes or unexpected restarts
  • Event ID 7023 or 7024 in System logs for service failures
  • Unusual symbolic link creation events

Network Indicators:

  • Sudden loss of VPN connectivity
  • Routing table inconsistencies

SIEM Query:

EventID=7023 AND ServiceName="RemoteAccess" OR EventID=4663 AND ObjectName LIKE "%RRAS%"

🔗 References

📤 Share & Export