Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54106: CWE-190: Integer Overflow or Wraparound in Microsoft Windows Server 2019

0
High
VulnerabilityCVE-2025-54106cvecve-2025-54106cwe-190
Published: Tue Sep 09 2025 (09/09/2025, 17:00:49 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows Server 2019

Description

Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.

AI-Powered Analysis

AILast updated: 12/23/2025, 21:31:41 UTC

Technical Analysis

CVE-2025-54106 is an integer overflow vulnerability classified under CWE-190 affecting the Windows Routing and Remote Access Service (RRAS) component in Microsoft Windows Server 2019, specifically version 10.0.17763.0. The flaw arises from improper validation and handling of integer values within RRAS, which can lead to an integer overflow or wraparound condition. This condition can cause memory corruption, enabling an attacker to execute arbitrary code remotely over the network without requiring any privileges. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), but requires user interaction (UI:R), such as sending crafted network packets to the RRAS service. The vulnerability impacts confidentiality, integrity, and availability (all rated high), and the scope is unchanged (affects only the vulnerable component). The CVSS v3.1 base score is 8.8, indicating high severity. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a critical risk for systems exposing RRAS services. RRAS is commonly used for routing, VPN, and remote access functionalities, making this vulnerability particularly dangerous in environments where these services are exposed to untrusted networks. The lack of available patches at the time of publication increases the urgency for organizations to implement interim mitigations and monitoring. The vulnerability was reserved in mid-July 2025 and published in early September 2025, indicating a recent discovery and disclosure timeline.

Potential Impact

The impact of CVE-2025-54106 on European organizations is significant due to the widespread use of Windows Server 2019 in enterprise and critical infrastructure environments. Successful exploitation can lead to complete system compromise, allowing attackers to execute arbitrary code remotely, potentially resulting in data breaches, disruption of network services, and lateral movement within corporate networks. Confidentiality is at risk as attackers may access sensitive information; integrity is compromised through unauthorized code execution; and availability may be affected by service disruption or system crashes. Organizations relying on RRAS for VPN or routing services, especially those exposing these services to the internet or untrusted networks, face elevated risks. The vulnerability could be leveraged in targeted attacks against government agencies, financial institutions, healthcare providers, and industrial control systems prevalent in Europe. The absence of known exploits currently provides a window for proactive defense, but the high CVSS score and ease of exploitation without authentication underscore the urgency for mitigation. Additionally, the requirement for user interaction suggests that social engineering or network-based triggers might be involved, increasing the attack surface in complex network environments.

Mitigation Recommendations

1. Apply official security patches from Microsoft immediately once available to remediate the integer overflow vulnerability in RRAS. 2. Until patches are released, restrict RRAS exposure by limiting network access to trusted internal networks only; block RRAS-related ports and protocols at network perimeters and firewalls. 3. Disable RRAS services if not required or replace with alternative secure VPN/routing solutions. 4. Implement network intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics to detect anomalous or malformed packets targeting RRAS. 5. Monitor logs and network traffic for unusual activity related to RRAS, including unexpected connection attempts or malformed packets. 6. Conduct network segmentation to isolate critical systems running Windows Server 2019 with RRAS enabled, reducing lateral movement potential. 7. Educate network administrators and security teams about the vulnerability and encourage vigilance for suspicious activity. 8. Review and tighten user interaction vectors that could trigger exploitation, such as limiting exposure to untrusted devices or users. 9. Maintain up-to-date asset inventories to identify all Windows Server 2019 instances running RRAS for prioritized remediation. 10. Engage with Microsoft support and threat intelligence sources for updates on exploit developments and patches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-07-16T19:49:12.440Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c071e2ce6ed8307545ba1a

Added to database: 9/9/2025, 6:28:50 PM

Last enriched: 12/23/2025, 9:31:41 PM

Last updated: 2/4/2026, 3:55:36 PM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats