Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60713: CWE-822: Untrusted Pointer Dereference in Microsoft Windows Server 2016

0
High
VulnerabilityCVE-2025-60713cvecve-2025-60713cwe-822
Published: Tue Nov 11 2025 (11/11/2025, 17:59:36 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows Server 2016

Description

Untrusted pointer dereference in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 05:51:11 UTC

Technical Analysis

CVE-2025-60713 is a vulnerability classified under CWE-822 (Untrusted Pointer Dereference) affecting Microsoft Windows Server 2016, specifically version 10.0.14393.0. The flaw exists in the Routing and Remote Access Service (RRAS), a component responsible for network routing and VPN services. The vulnerability arises when RRAS improperly dereferences pointers that can be influenced by an authorized local attacker. This improper handling can lead to memory corruption, allowing the attacker to escalate privileges from a limited user context to SYSTEM or equivalent high-privilege levels. The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with an attack vector limited to local access (AV:L), low attack complexity (AC:L), and requiring privileges (PR:L) but no user interaction (UI:N). The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component without impacting other system components. No known exploits have been reported in the wild yet, but the vulnerability's nature makes it a critical concern for environments where local user access is possible. The lack of available patches at the time of publication necessitates immediate risk mitigation through access control and monitoring. RRAS is widely used in enterprise and government networks for remote connectivity, making this vulnerability particularly relevant for organizations relying on Windows Server 2016 for network services.

Potential Impact

The vulnerability allows an authorized local attacker to escalate privileges, potentially gaining SYSTEM-level access. This can lead to full compromise of the affected server, enabling the attacker to execute arbitrary code, access sensitive data, modify system configurations, or disrupt services. Given that Windows Server 2016 is commonly deployed in enterprise, government, and critical infrastructure environments, exploitation could result in significant operational disruption, data breaches, and lateral movement within networks. The impact extends to confidentiality, integrity, and availability, as attackers could exfiltrate data, implant persistent malware, or cause denial of service. Since RRAS is often used for remote access and routing, compromised servers could be leveraged to intercept or manipulate network traffic, further amplifying the threat. Organizations with insufficient local access controls or monitoring are particularly vulnerable. The absence of known exploits currently provides a window for proactive defense, but the vulnerability's characteristics suggest it could be weaponized quickly once exploit code is developed.

Mitigation Recommendations

1. Apply official patches from Microsoft immediately once they become available to address CVE-2025-60713. 2. Until patches are released, restrict local access to Windows Server 2016 systems running RRAS to trusted administrators only. 3. Implement strict user privilege management, ensuring users have the minimum necessary rights and no unnecessary local privileges. 4. Monitor logs and system behavior for unusual local access attempts or privilege escalation indicators, including suspicious RRAS service activity. 5. Use application whitelisting and endpoint detection and response (EDR) solutions to detect and block exploitation attempts. 6. Consider isolating RRAS servers in segmented network zones to limit potential lateral movement if compromised. 7. Regularly audit and harden Windows Server configurations, disabling unused services and features to reduce attack surface. 8. Educate system administrators about the vulnerability and the importance of timely patching and access control enforcement. 9. Prepare incident response plans specifically addressing local privilege escalation scenarios to enable rapid containment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-09-26T05:03:24.536Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69137c4947ab3590319da0bf

Added to database: 11/11/2025, 6:11:21 PM

Last enriched: 2/27/2026, 5:51:11 AM

Last updated: 3/24/2026, 7:49:21 PM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses