CVE-2025-64678

8.8 HIGH

📋 TL;DR

A heap-based buffer overflow vulnerability in Windows Routing and Remote Access Service (RRAS) allows remote unauthenticated attackers to execute arbitrary code on affected systems. This affects Windows servers and workstations with RRAS enabled, potentially allowing complete system compromise over the network.

💻 Affected Systems

Products:
  • Windows Routing and Remote Access Service (RRAS)
Versions: Specific Windows versions as listed in Microsoft advisory
Operating Systems: Windows Server, Windows Client
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when RRAS is enabled and configured. Default Windows installations typically do not have RRAS enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full system compromise, lateral movement within the network, and potential ransomware deployment or data exfiltration.

🟠

Likely Case

Remote code execution resulting in system compromise, installation of backdoors, credential theft, and network persistence.

🟢

If Mitigated

Limited impact if network segmentation, firewalls, and proper access controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH - RRAS services exposed to the internet are directly vulnerable to remote exploitation without authentication.
🏢 Internal Only: HIGH - Internal attackers or compromised systems can exploit this vulnerability to move laterally within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to RRAS service. No authentication needed for exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Microsoft Security Update for specific KB numbers

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64678

Restart Required: Yes

Instructions:

1. Apply latest Windows security updates from Microsoft
2. Restart affected systems
3. Verify RRAS service is running with patched version

🔧 Temporary Workarounds

Disable RRAS Service

windows

Temporarily disable Routing and Remote Access Service if not required

sc config RemoteAccess start= disabled
net stop RemoteAccess

Network Segmentation

all

Restrict network access to RRAS service using firewalls

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate RRAS servers
  • Deploy intrusion prevention systems with CVE-specific signatures
  • Monitor for exploitation attempts and anomalous RRAS traffic

🔍 How to Verify

Check if Vulnerable:

Check if RRAS is enabled and running on Windows systems. Review system logs for RRAS service status.

Check Version:

wmic service where name='RemoteAccess' get name,pathname,startmode

Verify Fix Applied:

Verify Windows Update history contains the relevant security patch. Check RRAS service version matches patched release.

📡 Detection & Monitoring

Log Indicators:

  • Unusual RRAS service crashes or restarts
  • Suspicious network connections to RRAS ports
  • Unexpected process creation from RRAS service

Network Indicators:

  • Anomalous traffic patterns to RRAS ports (typically TCP 1723, UDP 1701)
  • Exploit-like payloads in network traffic to RRAS services

SIEM Query:

source="windows" AND (event_id=7031 OR event_id=7034) AND service_name="RemoteAccess"

🔗 References

📤 Share & Export