CVE-2025-58717: CWE-125: Out-of-bounds Read in Microsoft Windows 11 Version 25H2
Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
AI Analysis
Technical Summary
CVE-2025-58717 is a security vulnerability classified as CWE-125 (Out-of-bounds Read) found in the Windows Routing and Remote Access Service (RRAS) component of Microsoft Windows 11 Version 25H2 (build 10.0.26200.0). The vulnerability allows an attacker to perform an out-of-bounds read operation remotely, which can lead to unauthorized disclosure of sensitive information over a network. The attack vector is network-based (AV:N), requiring no privileges (PR:N) but does require user interaction (UI:R), such as responding to a crafted network request or connection. The scope is unchanged (S:U), meaning the vulnerability affects resources within the same security scope. The impact is high on confidentiality (C:H), with no impact on integrity (I:N) or availability (A:N). The CVSS v3.1 base score is 6.5, indicating a medium severity level. No patches were linked at the time of publication, and no exploits are known to be in the wild. RRAS is a service used to provide routing and remote access capabilities, often leveraged in enterprise environments for VPNs and network routing. An out-of-bounds read can cause the system to leak memory contents, potentially exposing sensitive data such as credentials or cryptographic material. This vulnerability could be exploited by attackers to gather intelligence for further attacks or to compromise privacy. The vulnerability was reserved on 2025-09-03 and published on 2025-10-14, indicating a relatively recent discovery. Given the nature of the flaw, exploitation requires user interaction but no authentication, increasing the risk in environments where RRAS is exposed to untrusted networks.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to confidentiality, as sensitive information could be disclosed to unauthorized attackers. Enterprises relying on Windows 11 25H2 with RRAS enabled, especially those using RRAS for VPN or routing services exposed to external networks, are at risk. The information leakage could facilitate further targeted attacks, including credential theft or network reconnaissance, potentially leading to more severe compromises. Critical infrastructure sectors such as finance, energy, and government agencies that use RRAS for remote access could face increased risk of espionage or data breaches. The medium severity score suggests that while the vulnerability is serious, it is not immediately catastrophic, but the requirement for user interaction means phishing or social engineering could be used to trigger exploitation. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate it, especially as attackers may develop exploits over time. Organizations with strict data privacy regulations, such as GDPR, must consider the potential compliance implications of data leakage.
Mitigation Recommendations
1. Monitor Microsoft security advisories closely and apply official patches immediately once released to address CVE-2025-58717. 2. If RRAS is not essential, disable the service to eliminate the attack surface. 3. Implement network segmentation to restrict RRAS exposure to trusted internal networks only, avoiding direct exposure to the internet or untrusted networks. 4. Employ strict firewall rules to limit inbound traffic to RRAS ports and protocols. 5. Educate users about the risks of interacting with unsolicited network requests or connections that could trigger the vulnerability. 6. Use intrusion detection and prevention systems (IDS/IPS) to monitor for anomalous RRAS traffic patterns that may indicate exploitation attempts. 7. Conduct regular vulnerability assessments and penetration testing focused on RRAS and related services. 8. Maintain comprehensive logging and monitoring of RRAS activity to detect suspicious behavior early. 9. Consider deploying endpoint detection and response (EDR) solutions capable of identifying exploitation attempts or unusual memory access patterns. 10. Prepare incident response plans specifically addressing potential information disclosure incidents related to RRAS.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-58717: CWE-125: Out-of-bounds Read in Microsoft Windows 11 Version 25H2
Description
Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
AI-Powered Analysis
Technical Analysis
CVE-2025-58717 is a security vulnerability classified as CWE-125 (Out-of-bounds Read) found in the Windows Routing and Remote Access Service (RRAS) component of Microsoft Windows 11 Version 25H2 (build 10.0.26200.0). The vulnerability allows an attacker to perform an out-of-bounds read operation remotely, which can lead to unauthorized disclosure of sensitive information over a network. The attack vector is network-based (AV:N), requiring no privileges (PR:N) but does require user interaction (UI:R), such as responding to a crafted network request or connection. The scope is unchanged (S:U), meaning the vulnerability affects resources within the same security scope. The impact is high on confidentiality (C:H), with no impact on integrity (I:N) or availability (A:N). The CVSS v3.1 base score is 6.5, indicating a medium severity level. No patches were linked at the time of publication, and no exploits are known to be in the wild. RRAS is a service used to provide routing and remote access capabilities, often leveraged in enterprise environments for VPNs and network routing. An out-of-bounds read can cause the system to leak memory contents, potentially exposing sensitive data such as credentials or cryptographic material. This vulnerability could be exploited by attackers to gather intelligence for further attacks or to compromise privacy. The vulnerability was reserved on 2025-09-03 and published on 2025-10-14, indicating a relatively recent discovery. Given the nature of the flaw, exploitation requires user interaction but no authentication, increasing the risk in environments where RRAS is exposed to untrusted networks.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to confidentiality, as sensitive information could be disclosed to unauthorized attackers. Enterprises relying on Windows 11 25H2 with RRAS enabled, especially those using RRAS for VPN or routing services exposed to external networks, are at risk. The information leakage could facilitate further targeted attacks, including credential theft or network reconnaissance, potentially leading to more severe compromises. Critical infrastructure sectors such as finance, energy, and government agencies that use RRAS for remote access could face increased risk of espionage or data breaches. The medium severity score suggests that while the vulnerability is serious, it is not immediately catastrophic, but the requirement for user interaction means phishing or social engineering could be used to trigger exploitation. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate it, especially as attackers may develop exploits over time. Organizations with strict data privacy regulations, such as GDPR, must consider the potential compliance implications of data leakage.
Mitigation Recommendations
1. Monitor Microsoft security advisories closely and apply official patches immediately once released to address CVE-2025-58717. 2. If RRAS is not essential, disable the service to eliminate the attack surface. 3. Implement network segmentation to restrict RRAS exposure to trusted internal networks only, avoiding direct exposure to the internet or untrusted networks. 4. Employ strict firewall rules to limit inbound traffic to RRAS ports and protocols. 5. Educate users about the risks of interacting with unsolicited network requests or connections that could trigger the vulnerability. 6. Use intrusion detection and prevention systems (IDS/IPS) to monitor for anomalous RRAS traffic patterns that may indicate exploitation attempts. 7. Conduct regular vulnerability assessments and penetration testing focused on RRAS and related services. 8. Maintain comprehensive logging and monitoring of RRAS activity to detect suspicious behavior early. 9. Consider deploying endpoint detection and response (EDR) solutions capable of identifying exploitation attempts or unusual memory access patterns. 10. Prepare incident response plans specifically addressing potential information disclosure incidents related to RRAS.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-09-03T20:46:29.256Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ee85883dd1bfb0b7e3f8d1
Added to database: 10/14/2025, 5:16:56 PM
Last enriched: 10/14/2025, 5:44:30 PM
Last updated: 10/16/2025, 3:19:50 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-61543: n/a
HighCVE-2025-61541: n/a
HighCVE-2025-61536: n/a
HighCVE-2025-41254: CWE-352: Cross-Site Request Forgery (CSRF) in VMware Spring Framework
MediumCVE-2025-36002: Password in Configuration File in IBM Sterling B2B Integrator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.