Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54096: CWE-125: Out-of-bounds Read in Microsoft Windows Server 2019

0
Medium
VulnerabilityCVE-2025-54096cvecve-2025-54096cwe-125
Published: Tue Sep 09 2025 (09/09/2025, 17:00:46 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows Server 2019

Description

Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.

AI-Powered Analysis

AILast updated: 10/02/2025, 00:45:25 UTC

Technical Analysis

CVE-2025-54096 is a security vulnerability identified as an out-of-bounds read (CWE-125) in the Windows Routing and Remote Access Service (RRAS) component of Microsoft Windows Server 2019, specifically version 10.0.17763.0. This vulnerability allows an unauthorized attacker to remotely cause the system to read memory outside the intended buffer boundaries. Such out-of-bounds reads can lead to the disclosure of sensitive information residing in adjacent memory areas, which could include sensitive data or system information. The vulnerability is exploitable over the network without requiring any privileges but does require user interaction, such as convincing a user to initiate a connection or interaction with the vulnerable RRAS service. The CVSS v3.1 base score is 6.5, indicating a medium severity level, with a high impact on confidentiality but no impact on integrity or availability. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and user interaction required (UI:R). The scope remains unchanged (S:U). Currently, there are no known exploits in the wild, and no patches have been linked or published yet. The vulnerability was reserved in mid-July 2025 and published in early September 2025. RRAS is a critical Windows Server component that provides routing and remote access capabilities, often used in enterprise environments for VPN and network routing services. An attacker exploiting this vulnerability could potentially extract sensitive information from the server memory remotely, which could aid in further attacks or reconnaissance.

Potential Impact

For European organizations, this vulnerability poses a significant risk particularly to enterprises and service providers relying on Windows Server 2019 for routing and remote access services. The confidentiality breach could expose sensitive corporate data, network configuration details, or credentials, which could be leveraged for lateral movement or further attacks. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that utilize RRAS for VPN or network routing are especially at risk. The medium severity rating reflects that while the vulnerability does not allow direct system compromise or denial of service, the information disclosure could facilitate more severe attacks. Given the network-based attack vector and lack of required privileges, attackers could potentially scan and target exposed RRAS services across European networks. The requirement for user interaction somewhat limits automated exploitation but does not eliminate risk, especially in environments where users frequently initiate remote connections. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future exploitation once details become widely known or if proof-of-concept code is developed.

Mitigation Recommendations

European organizations should prioritize the following specific mitigation steps: 1) Immediately inventory and identify all Windows Server 2019 instances running RRAS, especially version 10.0.17763.0. 2) Restrict network exposure of RRAS services by limiting access to trusted IP ranges and enforcing strict firewall rules to minimize attack surface. 3) Implement network segmentation to isolate RRAS servers from general user networks and sensitive data stores. 4) Monitor network traffic for unusual or unexpected RRAS connection attempts, especially those involving user interaction prompts. 5) Educate users about the risks of unsolicited or unexpected remote access prompts to reduce successful user interaction exploitation. 6) Apply any available security updates or patches from Microsoft as soon as they are released; if patches are not yet available, consider temporary disabling or restricting RRAS functionality if feasible. 7) Employ intrusion detection systems (IDS) and endpoint detection and response (EDR) tools configured to detect anomalous RRAS activity or memory disclosure attempts. 8) Conduct regular vulnerability scanning and penetration testing focused on RRAS and related network services to identify and remediate exposures proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-07-16T19:49:12.438Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c071e2ce6ed8307545b9e9

Added to database: 9/9/2025, 6:28:50 PM

Last enriched: 10/2/2025, 12:45:25 AM

Last updated: 10/29/2025, 9:44:05 AM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats