CVE-2025-29835: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809
Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
AI Analysis
Technical Summary
CVE-2025-29835 is a medium-severity vulnerability identified in Microsoft Windows 10 Version 1809, specifically in the Routing and Remote Access Service (RRAS). The vulnerability is classified as an out-of-bounds read (CWE-125), which allows an unauthorized attacker to read memory outside the intended buffer boundaries. This flaw can lead to the disclosure of sensitive information over a network without requiring any privileges (PR:N) but does require user interaction (UI:R), such as convincing a user to initiate a connection or interaction that triggers the vulnerability. The vulnerability does not impact integrity or availability but has a high impact on confidentiality (C:H). The attack vector is network-based (AV:N), meaning an attacker can exploit this remotely without physical access. The vulnerability affects Windows 10 Version 1809 (build 10.0.17763.0), a legacy version of Windows 10 that is still in use in some environments. No known exploits are currently in the wild, and no patches have been linked yet, indicating that mitigation may rely on workarounds or updates once released. The vulnerability could be leveraged to leak sensitive information from the affected system’s memory, potentially exposing credentials, cryptographic keys, or other confidential data processed by RRAS. Given that RRAS is used to provide VPN and routing services, exploitation could compromise network confidentiality and facilitate further attacks or reconnaissance by adversaries.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to enterprises and public sector entities that rely on Windows 10 Version 1809 for their VPN or remote access infrastructure. Disclosure of sensitive information could lead to exposure of internal network details, user credentials, or other confidential data, undermining trust and compliance with data protection regulations such as GDPR. The impact is heightened in sectors with strict confidentiality requirements, including finance, healthcare, and government. Since the vulnerability can be exploited remotely without authentication, attackers could target exposed RRAS endpoints to gain intelligence or prepare for subsequent attacks. Organizations that have not upgraded from Windows 10 Version 1809 or that maintain legacy systems for compatibility reasons are particularly vulnerable. The absence of known exploits in the wild suggests a window of opportunity for proactive mitigation before active exploitation begins. However, the requirement for user interaction may limit mass exploitation but does not eliminate targeted attacks against high-value targets.
Mitigation Recommendations
European organizations should prioritize upgrading affected systems to a supported and patched version of Windows 10 or later versions where this vulnerability is resolved. Until patches are available, organizations should restrict exposure of RRAS services to untrusted networks by implementing strict firewall rules and network segmentation to limit access only to trusted users and devices. Employing multi-factor authentication (MFA) for remote access can reduce the risk posed by user interaction requirements. Monitoring network traffic for unusual RRAS activity and enabling logging can help detect attempted exploitation. Additionally, organizations should educate users about the risks of interacting with unsolicited network prompts or connections that could trigger the vulnerability. Where possible, disabling RRAS on systems that do not require it can eliminate the attack surface. Regular vulnerability scanning and asset inventory management will help identify systems still running Windows 10 Version 1809 to prioritize remediation efforts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Finland
CVE-2025-29835: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809
Description
Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
AI-Powered Analysis
Technical Analysis
CVE-2025-29835 is a medium-severity vulnerability identified in Microsoft Windows 10 Version 1809, specifically in the Routing and Remote Access Service (RRAS). The vulnerability is classified as an out-of-bounds read (CWE-125), which allows an unauthorized attacker to read memory outside the intended buffer boundaries. This flaw can lead to the disclosure of sensitive information over a network without requiring any privileges (PR:N) but does require user interaction (UI:R), such as convincing a user to initiate a connection or interaction that triggers the vulnerability. The vulnerability does not impact integrity or availability but has a high impact on confidentiality (C:H). The attack vector is network-based (AV:N), meaning an attacker can exploit this remotely without physical access. The vulnerability affects Windows 10 Version 1809 (build 10.0.17763.0), a legacy version of Windows 10 that is still in use in some environments. No known exploits are currently in the wild, and no patches have been linked yet, indicating that mitigation may rely on workarounds or updates once released. The vulnerability could be leveraged to leak sensitive information from the affected system’s memory, potentially exposing credentials, cryptographic keys, or other confidential data processed by RRAS. Given that RRAS is used to provide VPN and routing services, exploitation could compromise network confidentiality and facilitate further attacks or reconnaissance by adversaries.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to enterprises and public sector entities that rely on Windows 10 Version 1809 for their VPN or remote access infrastructure. Disclosure of sensitive information could lead to exposure of internal network details, user credentials, or other confidential data, undermining trust and compliance with data protection regulations such as GDPR. The impact is heightened in sectors with strict confidentiality requirements, including finance, healthcare, and government. Since the vulnerability can be exploited remotely without authentication, attackers could target exposed RRAS endpoints to gain intelligence or prepare for subsequent attacks. Organizations that have not upgraded from Windows 10 Version 1809 or that maintain legacy systems for compatibility reasons are particularly vulnerable. The absence of known exploits in the wild suggests a window of opportunity for proactive mitigation before active exploitation begins. However, the requirement for user interaction may limit mass exploitation but does not eliminate targeted attacks against high-value targets.
Mitigation Recommendations
European organizations should prioritize upgrading affected systems to a supported and patched version of Windows 10 or later versions where this vulnerability is resolved. Until patches are available, organizations should restrict exposure of RRAS services to untrusted networks by implementing strict firewall rules and network segmentation to limit access only to trusted users and devices. Employing multi-factor authentication (MFA) for remote access can reduce the risk posed by user interaction requirements. Monitoring network traffic for unusual RRAS activity and enabling logging can help detect attempted exploitation. Additionally, organizations should educate users about the risks of interacting with unsolicited network prompts or connections that could trigger the vulnerability. Where possible, disabling RRAS on systems that do not require it can eliminate the attack surface. Regular vulnerability scanning and asset inventory management will help identify systems still running Windows 10 Version 1809 to prioritize remediation efforts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-03-11T22:56:43.944Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aeb96b
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 7/18/2025, 8:59:17 PM
Last updated: 8/12/2025, 12:25:16 PM
Views: 14
Related Threats
CVE-2025-34154: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Synergetic Data Systems Inc. UnForm Server Manager
CriticalCVE-2025-8927: Improper Restriction of Excessive Authentication Attempts in mtons mblog
MediumCVE-2025-43988: n/a
CriticalCVE-2025-8926: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-43986: n/a
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.