Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-54113: CWE-122: Heap-based Buffer Overflow in Microsoft Windows Server 2008 R2 Service Pack 1

0
High
VulnerabilityCVE-2025-54113cvecve-2025-54113cwe-122
Published: Tue Sep 09 2025 (09/09/2025, 17:01:24 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows Server 2008 R2 Service Pack 1

Description

Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 23:51:44 UTC

Technical Analysis

CVE-2025-54113 is a heap-based buffer overflow vulnerability identified in the Windows Routing and Remote Access Service (RRAS) component of Microsoft Windows Server 2008 R2 Service Pack 1 (version 6.1.7601.0). This vulnerability arises from improper handling of input data in RRAS, leading to a buffer overflow condition on the heap memory. An attacker can exploit this flaw by sending specially crafted network packets to the vulnerable RRAS service, which listens for routing and remote access requests. The flaw allows an unauthenticated attacker to execute arbitrary code remotely, potentially gaining full control over the affected system. The CVSS v3.1 base score is 8.8, indicating a high severity level, with attack vector as network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The impact covers confidentiality, integrity, and availability, all rated high. The vulnerability scope is unchanged (S:U), meaning the exploit affects only the vulnerable component and not other system components. No known exploits have been reported in the wild yet, and no official patches have been published at the time of disclosure. The affected product, Windows Server 2008 R2 SP1, is an older server OS version, often found in legacy enterprise environments. The vulnerability is classified under CWE-122 (Heap-based Buffer Overflow), a common and dangerous memory corruption issue that can lead to arbitrary code execution and system compromise. Due to the nature of RRAS, which handles network routing and remote access, exploitation can be performed remotely without authentication, increasing the risk profile significantly.

Potential Impact

The impact of CVE-2025-54113 is substantial for organizations still operating Windows Server 2008 R2 SP1 with RRAS enabled. Successful exploitation allows attackers to execute arbitrary code remotely, potentially leading to full system compromise, including unauthorized access to sensitive data, disruption of network services, and deployment of persistent malware or ransomware. The vulnerability affects confidentiality, integrity, and availability, making it a critical risk for enterprise networks relying on RRAS for routing or VPN services. Since the attack vector is network-based and requires no privileges, attackers can target exposed RRAS services directly from the internet or internal networks. This increases the attack surface, especially for organizations with inadequate network segmentation or firewall protections. The lack of available patches means organizations must rely on interim mitigations, increasing operational risk. Legacy systems often lack modern security controls, further exacerbating the threat. The vulnerability could be leveraged in targeted attacks against critical infrastructure, government networks, or enterprises with legacy Windows Server deployments, potentially causing significant operational and reputational damage.

Mitigation Recommendations

Given the absence of an official patch, organizations should implement immediate compensating controls to reduce exposure. First, disable the Routing and Remote Access Service (RRAS) on Windows Server 2008 R2 systems if it is not essential for business operations. If RRAS is required, restrict network access to the service using firewall rules to allow only trusted IP addresses and networks. Employ network segmentation to isolate vulnerable servers from untrusted networks, including the internet. Monitor network traffic for unusual or malformed packets targeting RRAS ports and implement intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect potential exploitation attempts. Regularly audit and inventory legacy Windows Server 2008 R2 deployments to prioritize remediation or upgrade plans. Consider deploying host-based application control or endpoint detection and response (EDR) solutions to detect anomalous process behavior indicative of exploitation. Finally, plan for migration to supported Windows Server versions with ongoing security updates to eliminate exposure to this and other legacy vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-07-16T19:49:12.441Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c071e2ce6ed8307545ba2c

Added to database: 9/9/2025, 6:28:50 PM

Last enriched: 2/28/2026, 11:51:44 PM

Last updated: 3/23/2026, 12:14:21 PM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses