CVE-2025-60715
📋 TL;DR
A heap-based buffer overflow vulnerability in Windows Routing and Remote Access Service (RRAS) allows authenticated attackers to execute arbitrary code remotely. This affects Windows systems with RRAS enabled, potentially allowing attackers to gain SYSTEM privileges on vulnerable servers. Organizations using Windows servers for routing or VPN services are primarily affected.
💻 Affected Systems
- Windows Routing and Remote Access Service (RRAS)
📦 What is this software?
Windows 10 1607 by Microsoft
Windows 10 1607 by Microsoft
Windows 10 1809 by Microsoft
Windows 10 1809 by Microsoft
Windows 10 21h2 by Microsoft
Windows 10 22h2 by Microsoft
Windows 11 23h2 by Microsoft
Windows 11 24h2 by Microsoft
Windows 11 25h2 by Microsoft
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with SYSTEM privileges, enabling persistent backdoors, lateral movement, and data exfiltration across the network.
Likely Case
Remote code execution leading to service disruption, credential theft, and installation of malware on vulnerable RRAS servers.
If Mitigated
Limited impact due to network segmentation, proper authentication controls, and exploit prevention technologies blocking the attack.
🎯 Exploit Status
Requires network access and valid authentication credentials. Heap manipulation adds complexity but buffer overflow exploitation is well-understood.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Microsoft Security Update for specific KB numbers
Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-60715
Restart Required: Yes
Instructions:
1. Apply the latest Windows security updates from Microsoft. 2. Restart affected systems. 3. Verify RRAS service is running properly after patching.
🔧 Temporary Workarounds
Disable RRAS Service
windowsTemporarily disable the Routing and Remote Access Service if not required
sc config RemoteAccess start= disabled
net stop RemoteAccess
Network Segmentation
allRestrict network access to RRAS servers using firewalls
🧯 If You Can't Patch
- Implement strict network access controls to limit connections to RRAS servers
- Enable exploit protection technologies like Control Flow Guard (CFG) and Data Execution Prevention (DEP)
🔍 How to Verify
Check if Vulnerable:
Check if RRAS service is running and compare Windows version/build against patched versions in Microsoft advisory
Check Version:
systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
Verify Fix Applied:
Verify Windows Update history shows the security patch applied and RRAS service version matches patched release
📡 Detection & Monitoring
Log Indicators:
- Unusual RRAS service crashes
- Failed authentication attempts followed by successful connections
- Process creation from RRAS service context
Network Indicators:
- Unusual network traffic patterns to/from RRAS ports
- Suspicious payloads in RRAS protocol communications
SIEM Query:
source="windows" AND (event_id=4625 OR event_id=4688) AND process_name="svchost.exe" AND service_name="RemoteAccess"