CVE-2025-29960: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809
Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
AI Analysis
Technical Summary
CVE-2025-29960 is a security vulnerability identified as an out-of-bounds read in the Windows Routing and Remote Access Service (RRAS) component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). This vulnerability is classified under CWE-125, indicating that it involves reading memory outside the intended buffer boundaries. The flaw allows an unauthorized attacker to remotely disclose sensitive information over the network without requiring any privileges or authentication, though user interaction is required to trigger the vulnerability. The vulnerability has a CVSS v3.1 base score of 6.5, categorizing it as medium severity. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), but requires user interaction (UI:R). The scope is unchanged (S:U), and the impact is high on confidentiality (C:H), with no impact on integrity (I:N) or availability (A:N). This means an attacker can potentially read sensitive memory contents from the affected system remotely, which could lead to leakage of confidential information such as credentials, cryptographic keys, or other sensitive data residing in memory. The vulnerability affects Windows 10 Version 1809, a legacy version of Windows 10, which is still in use in some environments. No public exploits are known at this time, and no patches have been linked yet, indicating that mitigation may rely on workarounds or limiting exposure until an official fix is released. The vulnerability was reserved in March 2025 and published in May 2025, reflecting recent discovery and disclosure.
Potential Impact
For European organizations, this vulnerability poses a significant risk to confidentiality, particularly for entities that still operate Windows 10 Version 1809 systems with RRAS enabled and exposed to untrusted networks. RRAS is often used to provide VPN and routing services, so organizations using this service for remote access could inadvertently expose sensitive internal information if exploited. The out-of-bounds read could allow attackers to extract sensitive data remotely, potentially leading to further attacks such as credential theft or lateral movement within networks. Given the medium severity and the requirement for user interaction, the risk is moderate but non-negligible, especially in sectors with high-value data such as finance, healthcare, government, and critical infrastructure. The lack of known exploits reduces immediate risk, but the presence of an unpatched vulnerability in a network-facing service means attackers could develop exploits in the near future. European organizations with legacy systems or insufficient patch management are particularly vulnerable. The confidentiality impact could lead to regulatory consequences under GDPR if personal data is leaked.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize the following actions: 1) Identify and inventory all systems running Windows 10 Version 1809, especially those with RRAS enabled and exposed to external or untrusted networks. 2) Disable RRAS on systems where it is not strictly necessary to reduce the attack surface. 3) If RRAS is required, restrict its exposure by implementing strict network segmentation and firewall rules to limit access only to trusted IP addresses and networks. 4) Apply any available security updates or patches from Microsoft as soon as they are released. Since no patches are currently linked, monitor Microsoft security advisories closely. 5) Employ network intrusion detection and prevention systems (IDS/IPS) to monitor for anomalous RRAS traffic that could indicate exploitation attempts. 6) Educate users about the requirement for user interaction in exploitation to reduce the risk of social engineering or phishing that could trigger the vulnerability. 7) Consider upgrading affected systems to a supported and fully patched version of Windows 10 or Windows 11 to eliminate exposure to this legacy vulnerability. 8) Conduct regular vulnerability assessments and penetration tests focusing on RRAS and remote access services to detect potential exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-29960: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809
Description
Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
AI-Powered Analysis
Technical Analysis
CVE-2025-29960 is a security vulnerability identified as an out-of-bounds read in the Windows Routing and Remote Access Service (RRAS) component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). This vulnerability is classified under CWE-125, indicating that it involves reading memory outside the intended buffer boundaries. The flaw allows an unauthorized attacker to remotely disclose sensitive information over the network without requiring any privileges or authentication, though user interaction is required to trigger the vulnerability. The vulnerability has a CVSS v3.1 base score of 6.5, categorizing it as medium severity. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), but requires user interaction (UI:R). The scope is unchanged (S:U), and the impact is high on confidentiality (C:H), with no impact on integrity (I:N) or availability (A:N). This means an attacker can potentially read sensitive memory contents from the affected system remotely, which could lead to leakage of confidential information such as credentials, cryptographic keys, or other sensitive data residing in memory. The vulnerability affects Windows 10 Version 1809, a legacy version of Windows 10, which is still in use in some environments. No public exploits are known at this time, and no patches have been linked yet, indicating that mitigation may rely on workarounds or limiting exposure until an official fix is released. The vulnerability was reserved in March 2025 and published in May 2025, reflecting recent discovery and disclosure.
Potential Impact
For European organizations, this vulnerability poses a significant risk to confidentiality, particularly for entities that still operate Windows 10 Version 1809 systems with RRAS enabled and exposed to untrusted networks. RRAS is often used to provide VPN and routing services, so organizations using this service for remote access could inadvertently expose sensitive internal information if exploited. The out-of-bounds read could allow attackers to extract sensitive data remotely, potentially leading to further attacks such as credential theft or lateral movement within networks. Given the medium severity and the requirement for user interaction, the risk is moderate but non-negligible, especially in sectors with high-value data such as finance, healthcare, government, and critical infrastructure. The lack of known exploits reduces immediate risk, but the presence of an unpatched vulnerability in a network-facing service means attackers could develop exploits in the near future. European organizations with legacy systems or insufficient patch management are particularly vulnerable. The confidentiality impact could lead to regulatory consequences under GDPR if personal data is leaked.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize the following actions: 1) Identify and inventory all systems running Windows 10 Version 1809, especially those with RRAS enabled and exposed to external or untrusted networks. 2) Disable RRAS on systems where it is not strictly necessary to reduce the attack surface. 3) If RRAS is required, restrict its exposure by implementing strict network segmentation and firewall rules to limit access only to trusted IP addresses and networks. 4) Apply any available security updates or patches from Microsoft as soon as they are released. Since no patches are currently linked, monitor Microsoft security advisories closely. 5) Employ network intrusion detection and prevention systems (IDS/IPS) to monitor for anomalous RRAS traffic that could indicate exploitation attempts. 6) Educate users about the requirement for user interaction in exploitation to reduce the risk of social engineering or phishing that could trigger the vulnerability. 7) Consider upgrading affected systems to a supported and fully patched version of Windows 10 or Windows 11 to eliminate exposure to this legacy vulnerability. 8) Conduct regular vulnerability assessments and penetration tests focusing on RRAS and remote access services to detect potential exploitation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-03-12T17:54:45.707Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aeb99d
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 9/10/2025, 3:18:09 AM
Last updated: 9/25/2025, 1:40:38 AM
Views: 24
Related Threats
CVE-2025-60164: CWE-352 Cross-Site Request Forgery (CSRF) in NewsMAN NewsmanApp
HighCVE-2025-59844: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in SonarSource sonarqube-scan-action
HighCVE-2025-11029: Cross-Site Request Forgery in givanz Vvveb
MediumCVE-2025-60165: CWE-862 Missing Authorization in HaruTheme Frames
MediumCVE-2025-60167: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in honzat Page Manager for Elementor
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.