CVE-2025-26669: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1507
Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
AI Analysis
Technical Summary
CVE-2025-26669 is an out-of-bounds read vulnerability classified under CWE-125, found in the Windows Routing and Remote Access Service (RRAS) component of Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The vulnerability arises from improper bounds checking when RRAS processes network packets, allowing an attacker to read memory beyond the intended buffer limits. This memory disclosure can reveal sensitive information, potentially including credentials, cryptographic keys, or other critical data residing in adjacent memory. The attack vector is network-based, requiring no privileges and no prior authentication, but does require user interaction, likely in the form of triggering RRAS to process crafted packets. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, as the attacker can cause information leakage and potentially destabilize the service. Although no public exploits have been reported yet, the vulnerability's nature and ease of exploitation make it a significant threat. RRAS is commonly used for VPN and routing services, so affected systems providing these services are at risk. The vulnerability was reserved in February 2025 and published in April 2025, with no patches currently linked, indicating a need for urgent vendor response and user mitigation.
Potential Impact
For European organizations, this vulnerability poses a serious risk especially to those still operating legacy Windows 10 Version 1507 systems with RRAS enabled. The out-of-bounds read can lead to unauthorized disclosure of sensitive information over the network, potentially exposing internal credentials, configuration data, or other confidential information. This can facilitate further attacks such as privilege escalation, lateral movement, or targeted espionage. Critical infrastructure sectors like finance, energy, healthcare, and government that rely on RRAS for secure remote access are particularly vulnerable. The high CVSS score indicates that exploitation could also impact system integrity and availability, possibly causing service disruptions. Given the lack of patches and known exploits, organizations face a window of exposure that attackers might exploit once proof-of-concept code emerges. The threat is amplified by the fact that no authentication is required, increasing the attack surface. European entities with legacy systems or insufficient network segmentation are at elevated risk of compromise and data leakage.
Mitigation Recommendations
Immediate mitigation steps include disabling the Routing and Remote Access Service on Windows 10 Version 1507 systems if it is not essential for business operations. Network segmentation should be enforced to limit exposure of RRAS-enabled hosts to untrusted networks. Employ strict firewall rules to restrict inbound traffic to RRAS ports only from trusted sources. Monitor network traffic for unusual or malformed packets targeting RRAS services. Since no official patches are currently available, organizations should prioritize upgrading affected systems to supported Windows versions with active security updates. Implement intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect exploitation attempts once available. Conduct thorough asset inventories to identify all systems running Windows 10 Version 1507 and RRAS. Prepare incident response plans for potential exploitation scenarios. Engage with Microsoft support channels for updates on patch releases and apply them promptly upon availability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands, Belgium, Sweden, Austria
CVE-2025-26669: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1507
Description
Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-26669 is an out-of-bounds read vulnerability classified under CWE-125, found in the Windows Routing and Remote Access Service (RRAS) component of Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The vulnerability arises from improper bounds checking when RRAS processes network packets, allowing an attacker to read memory beyond the intended buffer limits. This memory disclosure can reveal sensitive information, potentially including credentials, cryptographic keys, or other critical data residing in adjacent memory. The attack vector is network-based, requiring no privileges and no prior authentication, but does require user interaction, likely in the form of triggering RRAS to process crafted packets. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, as the attacker can cause information leakage and potentially destabilize the service. Although no public exploits have been reported yet, the vulnerability's nature and ease of exploitation make it a significant threat. RRAS is commonly used for VPN and routing services, so affected systems providing these services are at risk. The vulnerability was reserved in February 2025 and published in April 2025, with no patches currently linked, indicating a need for urgent vendor response and user mitigation.
Potential Impact
For European organizations, this vulnerability poses a serious risk especially to those still operating legacy Windows 10 Version 1507 systems with RRAS enabled. The out-of-bounds read can lead to unauthorized disclosure of sensitive information over the network, potentially exposing internal credentials, configuration data, or other confidential information. This can facilitate further attacks such as privilege escalation, lateral movement, or targeted espionage. Critical infrastructure sectors like finance, energy, healthcare, and government that rely on RRAS for secure remote access are particularly vulnerable. The high CVSS score indicates that exploitation could also impact system integrity and availability, possibly causing service disruptions. Given the lack of patches and known exploits, organizations face a window of exposure that attackers might exploit once proof-of-concept code emerges. The threat is amplified by the fact that no authentication is required, increasing the attack surface. European entities with legacy systems or insufficient network segmentation are at elevated risk of compromise and data leakage.
Mitigation Recommendations
Immediate mitigation steps include disabling the Routing and Remote Access Service on Windows 10 Version 1507 systems if it is not essential for business operations. Network segmentation should be enforced to limit exposure of RRAS-enabled hosts to untrusted networks. Employ strict firewall rules to restrict inbound traffic to RRAS ports only from trusted sources. Monitor network traffic for unusual or malformed packets targeting RRAS services. Since no official patches are currently available, organizations should prioritize upgrading affected systems to supported Windows versions with active security updates. Implement intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect exploitation attempts once available. Conduct thorough asset inventories to identify all systems running Windows 10 Version 1507 and RRAS. Prepare incident response plans for potential exploitation scenarios. Engage with Microsoft support channels for updates on patch releases and apply them promptly upon availability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-02-12T22:35:41.549Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aebb51
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 2/14/2026, 9:11:51 AM
Last updated: 3/25/2026, 2:58:40 PM
Views: 58
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.