Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58717: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1507

0
Medium
VulnerabilityCVE-2025-58717cvecve-2025-58717cwe-125
Published: Tue Oct 14 2025 (10/14/2025, 17:00:24 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/22/2026, 21:03:31 UTC

Technical Analysis

CVE-2025-58717 is a vulnerability classified as CWE-125 (Out-of-bounds Read) found in Microsoft Windows 10 Version 1507, specifically within the Routing and Remote Access Service (RRAS). The flaw allows an attacker to remotely trigger an out-of-bounds read condition, which can lead to unauthorized disclosure of information over the network. The vulnerability does not require any privileges (PR:N) but does require user interaction (UI:R), such as the victim initiating a connection or interaction that triggers the flaw. The attack vector is network-based (AV:N), meaning exploitation can be performed remotely without physical access. The vulnerability impacts confidentiality (C:H) but does not affect integrity or availability. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. The CVSS 3.1 score of 6.5 reflects a medium severity level, balancing the ease of exploitation with the impact on confidentiality. No known exploits have been observed in the wild, and no official patches have been released as of the publication date. The root cause is improper bounds checking in RRAS, which leads to reading memory beyond allocated buffers, potentially exposing sensitive data from system memory. This vulnerability primarily affects legacy Windows 10 Version 1507 systems, which are largely out of mainstream support but may still be in use in some environments. The absence of patches means organizations must rely on mitigations until updates are available. Given the nature of RRAS as a network service often used for VPN and routing, exposure to untrusted networks increases risk. The vulnerability could be leveraged as a reconnaissance step or combined with other exploits to escalate attacks.

Potential Impact

The primary impact of CVE-2025-58717 is unauthorized disclosure of sensitive information, which compromises confidentiality. Attackers exploiting this vulnerability can remotely access memory contents outside intended bounds, potentially revealing sensitive data such as credentials, configuration details, or other critical information stored in memory. While the vulnerability does not directly affect system integrity or availability, the leaked information could facilitate further attacks, including privilege escalation or lateral movement within networks. Organizations running Windows 10 Version 1507 with RRAS enabled, especially those exposing RRAS services to untrusted networks, face increased risk. Legacy systems that have not been updated or replaced are particularly vulnerable. The lack of known exploits reduces immediate risk, but the medium severity score and network attack vector mean that motivated attackers could develop exploits. This threat is significant for industries relying on RRAS for remote access, such as enterprises with VPN infrastructure, government agencies, and critical infrastructure providers. Data leakage could lead to regulatory compliance issues, reputational damage, and operational disruptions if sensitive information is exposed.

Mitigation Recommendations

1. Disable the Routing and Remote Access Service (RRAS) on Windows 10 Version 1507 systems if it is not required for business operations to eliminate the attack surface. 2. Restrict network exposure of RRAS services by implementing strict firewall rules limiting access to trusted IP addresses and networks only. 3. Employ network segmentation to isolate legacy Windows 10 systems running RRAS from critical infrastructure and sensitive data environments. 4. Monitor network traffic and system logs for unusual or unauthorized RRAS connection attempts or anomalous memory access patterns. 5. Educate users about the risk of interacting with untrusted networks or unsolicited connection requests that could trigger the vulnerability. 6. Plan and prioritize upgrading or replacing Windows 10 Version 1507 systems with supported versions that receive security updates. 7. Upon release, promptly apply official patches or security updates from Microsoft addressing CVE-2025-58717. 8. Use endpoint detection and response (EDR) tools to detect potential exploitation attempts targeting RRAS. 9. Conduct regular vulnerability assessments and penetration testing focusing on RRAS and related network services to identify exposure. 10. Implement strong network access controls and multi-factor authentication for remote access services to reduce risk of exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-09-03T20:46:29.256Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee85883dd1bfb0b7e3f8d1

Added to database: 10/14/2025, 5:16:56 PM

Last enriched: 2/22/2026, 9:03:31 PM

Last updated: 3/22/2026, 4:24:58 AM

Views: 94

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses