Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58717: CWE-125: Out-of-bounds Read in Microsoft Windows 11 Version 25H2

0
Medium
VulnerabilityCVE-2025-58717cvecve-2025-58717cwe-125
Published: Tue Oct 14 2025 (10/14/2025, 17:00:24 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 11 Version 25H2

Description

Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.

AI-Powered Analysis

AILast updated: 10/14/2025, 17:44:30 UTC

Technical Analysis

CVE-2025-58717 is a security vulnerability classified as CWE-125 (Out-of-bounds Read) found in the Windows Routing and Remote Access Service (RRAS) component of Microsoft Windows 11 Version 25H2 (build 10.0.26200.0). The vulnerability allows an attacker to perform an out-of-bounds read operation remotely, which can lead to unauthorized disclosure of sensitive information over a network. The attack vector is network-based (AV:N), requiring no privileges (PR:N) but does require user interaction (UI:R), such as responding to a crafted network request or connection. The scope is unchanged (S:U), meaning the vulnerability affects resources within the same security scope. The impact is high on confidentiality (C:H), with no impact on integrity (I:N) or availability (A:N). The CVSS v3.1 base score is 6.5, indicating a medium severity level. No patches were linked at the time of publication, and no exploits are known to be in the wild. RRAS is a service used to provide routing and remote access capabilities, often leveraged in enterprise environments for VPNs and network routing. An out-of-bounds read can cause the system to leak memory contents, potentially exposing sensitive data such as credentials or cryptographic material. This vulnerability could be exploited by attackers to gather intelligence for further attacks or to compromise privacy. The vulnerability was reserved on 2025-09-03 and published on 2025-10-14, indicating a relatively recent discovery. Given the nature of the flaw, exploitation requires user interaction but no authentication, increasing the risk in environments where RRAS is exposed to untrusted networks.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to confidentiality, as sensitive information could be disclosed to unauthorized attackers. Enterprises relying on Windows 11 25H2 with RRAS enabled, especially those using RRAS for VPN or routing services exposed to external networks, are at risk. The information leakage could facilitate further targeted attacks, including credential theft or network reconnaissance, potentially leading to more severe compromises. Critical infrastructure sectors such as finance, energy, and government agencies that use RRAS for remote access could face increased risk of espionage or data breaches. The medium severity score suggests that while the vulnerability is serious, it is not immediately catastrophic, but the requirement for user interaction means phishing or social engineering could be used to trigger exploitation. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate it, especially as attackers may develop exploits over time. Organizations with strict data privacy regulations, such as GDPR, must consider the potential compliance implications of data leakage.

Mitigation Recommendations

1. Monitor Microsoft security advisories closely and apply official patches immediately once released to address CVE-2025-58717. 2. If RRAS is not essential, disable the service to eliminate the attack surface. 3. Implement network segmentation to restrict RRAS exposure to trusted internal networks only, avoiding direct exposure to the internet or untrusted networks. 4. Employ strict firewall rules to limit inbound traffic to RRAS ports and protocols. 5. Educate users about the risks of interacting with unsolicited network requests or connections that could trigger the vulnerability. 6. Use intrusion detection and prevention systems (IDS/IPS) to monitor for anomalous RRAS traffic patterns that may indicate exploitation attempts. 7. Conduct regular vulnerability assessments and penetration testing focused on RRAS and related services. 8. Maintain comprehensive logging and monitoring of RRAS activity to detect suspicious behavior early. 9. Consider deploying endpoint detection and response (EDR) solutions capable of identifying exploitation attempts or unusual memory access patterns. 10. Prepare incident response plans specifically addressing potential information disclosure incidents related to RRAS.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-09-03T20:46:29.256Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee85883dd1bfb0b7e3f8d1

Added to database: 10/14/2025, 5:16:56 PM

Last enriched: 10/14/2025, 5:44:30 PM

Last updated: 10/16/2025, 3:19:50 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats