Skip to main content

CVE-2025-33064: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2025-33064cvecve-2025-33064cwe-122
Published: Tue Jun 10 2025 (06/10/2025, 17:02:20 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.

AI-Powered Analysis

AILast updated: 07/10/2025, 23:03:26 UTC

Technical Analysis

CVE-2025-33064 is a high-severity heap-based buffer overflow vulnerability identified in the Microsoft Windows 10 Version 1809, specifically within the Routing and Remote Access Service (RRAS). RRAS is a critical component that provides routing and remote access capabilities, enabling network connectivity features such as VPN and NAT services. The vulnerability arises from improper handling of memory buffers on the heap, which can be exploited by an authorized attacker with network access and privileges to execute arbitrary code remotely. The attacker does not require user interaction to exploit this flaw, and the vulnerability allows for complete compromise of confidentiality, integrity, and availability of the affected system. The CVSS v3.1 score of 8.8 reflects the high impact and relatively low complexity of exploitation, given that only low privileges are required and no user interaction is necessary. Although no known exploits are currently in the wild, the vulnerability's nature and impact make it a critical risk for affected systems. The affected version is Windows 10 build 17763.0 (Version 1809), which is an older but still in-use release in some environments. The lack of available patches at the time of publication increases the urgency for mitigation and risk management.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for enterprises and service providers relying on Windows 10 Version 1809 systems for network routing and remote access services. Successful exploitation could lead to full system compromise, enabling attackers to execute arbitrary code remotely, potentially leading to data breaches, lateral movement within networks, disruption of critical services, and loss of sensitive information. Organizations in sectors such as finance, healthcare, government, and critical infrastructure are particularly vulnerable due to the sensitive nature of their data and reliance on secure remote access. The vulnerability could also be leveraged in targeted attacks or ransomware campaigns, amplifying operational and reputational damage. Given the network-based attack vector and the absence of required user interaction, the threat can propagate rapidly within corporate networks if not contained. The impact is exacerbated in environments where legacy systems remain unpatched or where RRAS is actively used for VPN or routing services.

Mitigation Recommendations

Immediate mitigation should focus on minimizing exposure of Windows 10 Version 1809 systems running RRAS to untrusted networks. Network segmentation and strict firewall rules should be applied to restrict access to RRAS services only to trusted and necessary sources. Organizations should audit their environment to identify all instances of Windows 10 Version 1809 and prioritize patching or upgrading to supported Windows versions with security updates. If patches become available, they must be applied promptly. In the absence of patches, consider disabling RRAS if it is not essential, or replacing it with alternative secure remote access solutions. Employ network intrusion detection systems (NIDS) and endpoint detection and response (EDR) tools to monitor for anomalous activity indicative of exploitation attempts. Regularly review and enforce the principle of least privilege to limit the potential impact of compromised accounts. Finally, maintain up-to-date backups and incident response plans to mitigate the effects of potential successful exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-04-15T17:46:28.200Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f511b0bd07c39389baf

Added to database: 6/10/2025, 6:54:09 PM

Last enriched: 7/10/2025, 11:03:26 PM

Last updated: 8/3/2025, 12:37:27 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats