Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62452: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-62452cvecve-2025-62452cwe-122
Published: Tue Nov 11 2025 (11/11/2025, 17:59:33 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.

AI-Powered Analysis

AILast updated: 01/02/2026, 23:23:09 UTC

Technical Analysis

CVE-2025-62452 is a heap-based buffer overflow vulnerability classified under CWE-122, affecting the Windows Routing and Remote Access Service (RRAS) component in Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw arises from improper handling of memory buffers within RRAS, which can be triggered by specially crafted network packets sent by an attacker who is authorized to access the service. This vulnerability allows remote code execution (RCE) with high impact on confidentiality, integrity, and availability. The attacker requires network access and limited privileges (PR:L) and user interaction (UI:R) to exploit the vulnerability, but no elevated privileges are necessary. The vulnerability is exploitable over the network (AV:N) with low attack complexity (AC:L). The scope of impact is unchanged (S:U), meaning the exploit affects only the vulnerable component. The CVSS vector indicates critical impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability's nature and severity make it a significant threat. The lack of available patches at the time of publication increases the urgency for organizations to implement interim mitigations. RRAS is commonly used for VPN and routing services, and its compromise could lead to full system takeover, lateral movement, and data exfiltration.

Potential Impact

For European organizations, the impact of CVE-2025-62452 is substantial. Many enterprises and public sector entities still operate Windows 10 Version 1809, particularly in industrial control systems, legacy IT environments, and specialized network infrastructure. Exploitation could lead to unauthorized remote code execution, enabling attackers to gain control over affected systems, disrupt network services, and access sensitive data. This could result in operational downtime, data breaches, and compromise of critical infrastructure. The vulnerability's network-based attack vector increases the risk of widespread exploitation, especially in organizations exposing RRAS services to untrusted networks or lacking strict network segmentation. The requirement for user interaction may limit automated mass exploitation but does not eliminate targeted attacks. Given the high severity and potential for full system compromise, European organizations must assess their exposure and prioritize mitigation to protect business continuity and data privacy.

Mitigation Recommendations

1. Apply official Microsoft patches immediately once they become available for Windows 10 Version 1809 to remediate the vulnerability. 2. Until patches are released, disable or restrict the Windows Routing and Remote Access Service (RRAS) on systems where it is not essential. 3. Implement strict network segmentation and firewall rules to limit RRAS exposure to trusted internal networks only, blocking access from untrusted or public networks. 4. Monitor network traffic for unusual or malformed packets targeting RRAS, using intrusion detection/prevention systems (IDS/IPS) with updated signatures. 5. Enforce least privilege principles to minimize authorized user access to RRAS services, reducing the attack surface. 6. Educate users about the risks of interacting with unsolicited network prompts or connections that could trigger exploitation. 7. Conduct regular vulnerability scanning and penetration testing focusing on RRAS and related network services to identify and remediate weaknesses. 8. Maintain up-to-date asset inventories to identify all systems running Windows 10 Version 1809 and prioritize remediation efforts accordingly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-10-14T18:24:58.483Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69137c4d47ab3590319dbf77

Added to database: 11/11/2025, 6:11:25 PM

Last enriched: 1/2/2026, 11:23:09 PM

Last updated: 2/4/2026, 3:34:10 AM

Views: 179

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats