Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-29832: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809

0
Medium
VulnerabilityCVE-2025-29832cvecve-2025-29832cwe-125
Published: Tue May 13 2025 (05/13/2025, 16:58:58 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.

AI-Powered Analysis

AILast updated: 09/10/2025, 03:14:39 UTC

Technical Analysis

CVE-2025-29832 is a security vulnerability classified as an out-of-bounds read (CWE-125) affecting Microsoft Windows 10 Version 1809, specifically build 10.0.17763.0. The flaw exists within the Windows Routing and Remote Access Service (RRAS), a component responsible for routing network traffic and providing remote access capabilities. An out-of-bounds read occurs when a program reads data outside the boundaries of allocated memory, potentially exposing sensitive information. In this case, an unauthorized attacker can exploit this vulnerability over a network without requiring privileges but does require user interaction, such as convincing a user to initiate a connection or access a malicious resource. The vulnerability allows the attacker to disclose information, impacting confidentiality but not integrity or availability. The CVSS v3.1 base score is 6.5 (medium severity), reflecting the network attack vector, low attack complexity, no privileges required, user interaction needed, and a high impact on confidentiality. No known exploits are currently in the wild, and no patches have been linked yet, indicating that mitigation may rely on workarounds or upcoming updates. The vulnerability could be leveraged in targeted attacks to gather sensitive data from affected systems, potentially aiding further exploitation or reconnaissance activities.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems still running Windows 10 Version 1809, which, despite being an older release, may remain in use in certain environments due to legacy application dependencies or delayed upgrade cycles. The information disclosure could lead to leakage of sensitive internal data, network configuration details, or credentials, which attackers could use to escalate privileges or move laterally within networks. Sectors with high reliance on remote access services, such as financial institutions, healthcare providers, and critical infrastructure operators, could face increased risk. The medium severity rating suggests that while the vulnerability is not immediately catastrophic, it could be a stepping stone in multi-stage attacks. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability details become widely known. Organizations with remote workforce setups or extensive VPN usage may be particularly vulnerable if RRAS is enabled and exposed.

Mitigation Recommendations

European organizations should prioritize identifying and inventorying systems running Windows 10 Version 1809, especially those with RRAS enabled. Immediate mitigation steps include disabling RRAS if not required or restricting its exposure to untrusted networks. Network-level controls such as firewall rules should limit access to RRAS services to trusted hosts only. User education to avoid interacting with suspicious network prompts or connections can reduce exploitation chances. Monitoring network traffic for unusual RRAS activity and deploying intrusion detection systems tuned to detect anomalous behavior related to RRAS can provide early warnings. Organizations should stay alert for official patches or security advisories from Microsoft and apply updates promptly once available. In environments where upgrading the OS is feasible, migrating to a supported Windows version with ongoing security updates will reduce exposure. Additionally, employing endpoint detection and response (EDR) solutions can help detect exploitation attempts or unusual memory access patterns indicative of out-of-bounds reads.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-03-11T22:56:43.944Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aeb967

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 9/10/2025, 3:14:39 AM

Last updated: 10/4/2025, 3:48:12 PM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats