Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-29836: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1507

0
Medium
VulnerabilityCVE-2025-29836cvecve-2025-29836cwe-125
Published: Tue May 13 2025 (05/13/2025, 16:59:00 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 09:38:14 UTC

Technical Analysis

CVE-2025-29836 is a security vulnerability classified as CWE-125 (Out-of-bounds Read) found in the Windows Routing and Remote Access Service (RRAS) component of Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The flaw arises due to improper bounds checking when RRAS processes certain network inputs, allowing an attacker to read memory outside the intended buffer boundaries. This out-of-bounds read can lead to unauthorized disclosure of sensitive information over the network. The vulnerability can be exploited remotely without requiring any privileges (AV:N/PR:N), but user interaction is necessary (UI:R), such as convincing a user to connect to a malicious network or service. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. The confidentiality impact is high (C:H), while integrity and availability are unaffected (I:N/A:N). The CVSS 3.1 base score is 6.5, reflecting a medium severity. No patches or exploits are currently publicly available, but the vulnerability is officially published and recognized by Microsoft and CISA. The affected Windows version is an early release of Windows 10, which is mostly superseded by newer versions but may still be in use in legacy environments. RRAS is commonly used to provide VPN and routing services, making this vulnerability relevant in network perimeter and remote access scenarios. Attackers exploiting this flaw could gain access to sensitive memory contents, potentially including credentials or configuration data, leading to further compromise or information leakage. Organizations running this Windows version with RRAS enabled should prioritize mitigation to prevent data exposure.

Potential Impact

For European organizations, the primary impact of CVE-2025-29836 is the potential unauthorized disclosure of sensitive information due to the out-of-bounds read in RRAS. This can compromise confidentiality, especially if RRAS is used to facilitate VPN or remote access connections, exposing internal network details or credentials. While the vulnerability does not affect integrity or availability, leaked information could enable subsequent attacks such as privilege escalation or lateral movement. Organizations relying on legacy Windows 10 Version 1507 systems, particularly in critical infrastructure sectors like energy, finance, or government, may face increased risk if these systems are exposed to untrusted networks. The medium severity score indicates a moderate risk, but the lack of required privileges lowers the barrier for attackers. However, the need for user interaction somewhat limits exploitation scenarios. The absence of known exploits reduces immediate threat but does not eliminate future risk. Overall, the vulnerability could lead to data breaches, regulatory non-compliance (e.g., GDPR), and reputational damage if exploited in European contexts.

Mitigation Recommendations

1. Upgrade all affected systems from Windows 10 Version 1507 to a supported and fully patched Windows version to eliminate the vulnerability. 2. Disable or restrict the use of RRAS where it is not essential, especially on systems exposed to untrusted networks. 3. Implement network segmentation and firewall rules to limit RRAS traffic to trusted endpoints only. 4. Monitor network traffic for unusual RRAS connection attempts or anomalous data patterns indicative of exploitation attempts. 5. Educate users about the risks of connecting to untrusted networks or services that could trigger user interaction exploitation vectors. 6. Employ endpoint detection and response (EDR) solutions to detect suspicious memory access patterns or abnormal RRAS behavior. 7. Maintain an inventory of legacy systems and plan for their timely decommissioning or upgrade to reduce exposure. 8. Apply network intrusion detection systems (NIDS) with signatures or heuristics tuned to detect RRAS-related exploits once available. 9. Coordinate with Microsoft support and subscribe to security advisories for updates or patches related to this vulnerability. 10. Conduct regular security assessments and penetration tests focusing on remote access services to identify and remediate similar weaknesses.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-03-11T22:56:43.944Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aeb96d

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/14/2026, 9:38:14 AM

Last updated: 3/26/2026, 8:57:18 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses