Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62473: CWE-126: Buffer Over-read in Microsoft Windows 10 Version 1809

0
Medium
VulnerabilityCVE-2025-62473cvecve-2025-62473cwe-126
Published: Tue Dec 09 2025 (12/09/2025, 17:55:38 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.

AI-Powered Analysis

AILast updated: 12/09/2025, 18:34:29 UTC

Technical Analysis

CVE-2025-62473 is a buffer over-read vulnerability classified under CWE-126, affecting the Windows Routing and Remote Access Service (RRAS) component in Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability arises from improper bounds checking during the processing of network packets by RRAS, which can lead to reading beyond the intended buffer limits. This flaw allows an unauthenticated remote attacker to send specially crafted network packets to the RRAS service, causing it to disclose sensitive memory contents. The disclosed information could include sensitive data residing in memory, potentially aiding further attacks or reconnaissance. The vulnerability does not allow for code execution, privilege escalation, or denial of service, but it compromises confidentiality by leaking information. Exploitation requires no privileges but does require user interaction, likely in the form of triggering the RRAS service to process malicious input. The CVSS v3.1 base score is 6.5, reflecting a medium severity with high confidentiality impact, no impact on integrity or availability, low attack complexity, no privileges required, and user interaction needed. As of the publication date, no patches or known exploits are available, indicating the vulnerability is newly disclosed and unmitigated. Organizations running Windows 10 Version 1809 with RRAS enabled should consider this a significant risk for information disclosure over the network.

Potential Impact

For European organizations, the primary impact of CVE-2025-62473 is the unauthorized disclosure of sensitive information over the network, which can lead to exposure of confidential data, intellectual property, or internal network details. This information leakage could facilitate further targeted attacks such as phishing, lateral movement, or privilege escalation. Sectors with high reliance on RRAS for VPN or remote access, such as government agencies, financial institutions, healthcare providers, and critical infrastructure operators, are particularly vulnerable. The vulnerability does not directly affect system integrity or availability, so operational disruption is unlikely. However, the confidentiality breach could result in regulatory compliance issues under GDPR, leading to legal and financial penalties. The lack of available patches increases the window of exposure, necessitating immediate mitigation measures. The medium severity suggests a moderate risk level, but the potential for sensitive data leakage makes it a concern for organizations handling sensitive or regulated information.

Mitigation Recommendations

To mitigate CVE-2025-62473, European organizations should implement the following specific measures: 1) Disable the Routing and Remote Access Service (RRAS) if it is not essential to business operations to eliminate the attack surface. 2) If RRAS is required, restrict its exposure by limiting access to trusted networks and IP addresses using firewall rules and network segmentation. 3) Employ network intrusion detection and prevention systems (IDS/IPS) to monitor and block suspicious packets targeting RRAS. 4) Enforce strict network access controls and multi-factor authentication for remote access services to reduce the risk of exploitation. 5) Regularly audit and monitor RRAS logs for unusual activity indicative of exploitation attempts. 6) Prepare for patch deployment by tracking Microsoft security advisories and applying updates promptly once available. 7) Educate IT staff and users about the risks of interacting with unsolicited network services and the importance of reporting anomalies. These targeted actions go beyond generic advice by focusing on RRAS-specific controls and proactive monitoring.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-10-14T18:24:58.485Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693867e574ebaa3babafb397

Added to database: 12/9/2025, 6:18:13 PM

Last enriched: 12/9/2025, 6:34:29 PM

Last updated: 12/10/2025, 11:03:12 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats