Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26664: CWE-126: Buffer Over-read in Microsoft Windows Server 2008 R2 Service Pack 1

0
Medium
VulnerabilityCVE-2025-26664cvecve-2025-26664cwe-126
Published: Tue Apr 08 2025 (04/08/2025, 17:23:05 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows Server 2008 R2 Service Pack 1

Description

Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 09:10:49 UTC

Technical Analysis

CVE-2025-26664 is a buffer over-read vulnerability classified under CWE-126, affecting Microsoft Windows Server 2008 R2 Service Pack 1 specifically within the Routing and Remote Access Service (RRAS). This vulnerability arises due to improper bounds checking when processing certain network inputs, allowing an attacker to read beyond the intended buffer boundaries. The consequence is unauthorized disclosure of information over the network, potentially leaking sensitive data from the affected system's memory. The vulnerability can be exploited remotely without requiring any privileges (AV:N/PR:N), but user interaction is necessary (UI:R), such as sending specially crafted network packets to the RRAS service. The scope is unchanged (S:U), and the impact is limited to confidentiality (C:H), with no impact on integrity or availability. The CVSS v3.1 base score is 6.5, indicating medium severity. No known exploits have been observed in the wild, and no official patches have been released at the time of publication. Windows Server 2008 R2 is an older operating system, often still used in legacy environments, especially in organizations that have not migrated to newer versions. RRAS is a networking service that provides routing and remote access capabilities, commonly used for VPNs and network routing. Exploitation could allow attackers to glean sensitive information such as memory contents, potentially aiding further attacks or reconnaissance. Since the vulnerability requires network access to RRAS and user interaction, exposure is limited to environments where RRAS is enabled and accessible. The lack of patches necessitates alternative mitigations until official updates are available.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to confidentiality, as attackers can remotely extract sensitive information from affected Windows Server 2008 R2 systems running RRAS. Many European enterprises and public sector entities still operate legacy infrastructure due to long upgrade cycles or specialized applications, increasing exposure. Information disclosure could facilitate further targeted attacks, such as credential theft or network mapping. Critical infrastructure sectors, including energy, transportation, and government, often rely on legacy Microsoft servers and RRAS for VPN and routing services, making them attractive targets. The vulnerability does not directly impact system integrity or availability, so operational disruption is unlikely. However, leaked information could undermine trust, compliance with data protection regulations like GDPR, and overall security posture. The medium severity score reflects moderate risk but should not be underestimated given the potential for chained attacks. Organizations with RRAS exposed to untrusted networks, including remote access VPN endpoints, are particularly vulnerable. The absence of known exploits reduces immediate risk but also means attackers may develop exploits in the future.

Mitigation Recommendations

Until official patches are released, European organizations should implement specific mitigations to reduce risk from CVE-2025-26664. First, disable the Routing and Remote Access Service on Windows Server 2008 R2 systems if it is not strictly required. If RRAS is necessary, restrict its network exposure by applying strict firewall rules to limit access only to trusted IP addresses and networks. Employ network segmentation to isolate legacy servers from general user networks and the internet. Monitor network traffic for unusual or malformed packets targeting RRAS ports, using intrusion detection systems or network behavior analytics. Conduct thorough asset inventories to identify all Windows Server 2008 R2 instances running RRAS and prioritize their protection or upgrade. Consider deploying host-based intrusion prevention systems (HIPS) to detect anomalous memory access patterns. Plan and accelerate migration away from Windows Server 2008 R2 to supported operating systems with ongoing security updates. Educate IT staff about this vulnerability and the importance of minimizing legacy service exposure. Finally, maintain up-to-date backups and incident response plans to quickly respond if exploitation attempts are detected.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-02-12T22:35:41.548Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebb3c

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/14/2026, 9:10:49 AM

Last updated: 3/23/2026, 8:51:20 AM

Views: 86

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses