Skip to main content

CVE-2025-29835: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2025-29835cvecve-2025-29835cwe-125cwe-476
Published: Tue May 13 2025 (05/13/2025, 16:58:59 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.

AI-Powered Analysis

AILast updated: 07/18/2025, 20:59:17 UTC

Technical Analysis

CVE-2025-29835 is a medium-severity vulnerability identified in Microsoft Windows 10 Version 1809, specifically in the Routing and Remote Access Service (RRAS). The vulnerability is classified as an out-of-bounds read (CWE-125), which allows an unauthorized attacker to read memory outside the intended buffer boundaries. This flaw can lead to the disclosure of sensitive information over a network without requiring any privileges (PR:N) but does require user interaction (UI:R), such as convincing a user to initiate a connection or interaction that triggers the vulnerability. The vulnerability does not impact integrity or availability but has a high impact on confidentiality (C:H). The attack vector is network-based (AV:N), meaning an attacker can exploit this remotely without physical access. The vulnerability affects Windows 10 Version 1809 (build 10.0.17763.0), a legacy version of Windows 10 that is still in use in some environments. No known exploits are currently in the wild, and no patches have been linked yet, indicating that mitigation may rely on workarounds or updates once released. The vulnerability could be leveraged to leak sensitive information from the affected system’s memory, potentially exposing credentials, cryptographic keys, or other confidential data processed by RRAS. Given that RRAS is used to provide VPN and routing services, exploitation could compromise network confidentiality and facilitate further attacks or reconnaissance by adversaries.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially to enterprises and public sector entities that rely on Windows 10 Version 1809 for their VPN or remote access infrastructure. Disclosure of sensitive information could lead to exposure of internal network details, user credentials, or other confidential data, undermining trust and compliance with data protection regulations such as GDPR. The impact is heightened in sectors with strict confidentiality requirements, including finance, healthcare, and government. Since the vulnerability can be exploited remotely without authentication, attackers could target exposed RRAS endpoints to gain intelligence or prepare for subsequent attacks. Organizations that have not upgraded from Windows 10 Version 1809 or that maintain legacy systems for compatibility reasons are particularly vulnerable. The absence of known exploits in the wild suggests a window of opportunity for proactive mitigation before active exploitation begins. However, the requirement for user interaction may limit mass exploitation but does not eliminate targeted attacks against high-value targets.

Mitigation Recommendations

European organizations should prioritize upgrading affected systems to a supported and patched version of Windows 10 or later versions where this vulnerability is resolved. Until patches are available, organizations should restrict exposure of RRAS services to untrusted networks by implementing strict firewall rules and network segmentation to limit access only to trusted users and devices. Employing multi-factor authentication (MFA) for remote access can reduce the risk posed by user interaction requirements. Monitoring network traffic for unusual RRAS activity and enabling logging can help detect attempted exploitation. Additionally, organizations should educate users about the risks of interacting with unsolicited network prompts or connections that could trigger the vulnerability. Where possible, disabling RRAS on systems that do not require it can eliminate the attack surface. Regular vulnerability scanning and asset inventory management will help identify systems still running Windows 10 Version 1809 to prioritize remediation efforts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-03-11T22:56:43.944Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aeb96b

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/18/2025, 8:59:17 PM

Last updated: 8/12/2025, 12:25:16 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats