CVE-2025-62473: CWE-126: Buffer Over-read in Microsoft Windows 10 Version 1809
Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
AI Analysis
Technical Summary
CVE-2025-62473 is a buffer over-read vulnerability classified under CWE-126, affecting the Windows Routing and Remote Access Service (RRAS) component in Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability arises from improper bounds checking during the processing of network packets by RRAS, which can lead to reading beyond the intended buffer limits. This flaw allows an unauthenticated remote attacker to send specially crafted network packets to the RRAS service, causing it to disclose sensitive memory contents. The disclosed information could include sensitive data residing in memory, potentially aiding further attacks or reconnaissance. The vulnerability does not allow for code execution, privilege escalation, or denial of service, but it compromises confidentiality by leaking information. Exploitation requires no privileges but does require user interaction, likely in the form of triggering the RRAS service to process malicious input. The CVSS v3.1 base score is 6.5, reflecting a medium severity with high confidentiality impact, no impact on integrity or availability, low attack complexity, no privileges required, and user interaction needed. As of the publication date, no patches or known exploits are available, indicating the vulnerability is newly disclosed and unmitigated. Organizations running Windows 10 Version 1809 with RRAS enabled should consider this a significant risk for information disclosure over the network.
Potential Impact
For European organizations, the primary impact of CVE-2025-62473 is the unauthorized disclosure of sensitive information over the network, which can lead to exposure of confidential data, intellectual property, or internal network details. This information leakage could facilitate further targeted attacks such as phishing, lateral movement, or privilege escalation. Sectors with high reliance on RRAS for VPN or remote access, such as government agencies, financial institutions, healthcare providers, and critical infrastructure operators, are particularly vulnerable. The vulnerability does not directly affect system integrity or availability, so operational disruption is unlikely. However, the confidentiality breach could result in regulatory compliance issues under GDPR, leading to legal and financial penalties. The lack of available patches increases the window of exposure, necessitating immediate mitigation measures. The medium severity suggests a moderate risk level, but the potential for sensitive data leakage makes it a concern for organizations handling sensitive or regulated information.
Mitigation Recommendations
To mitigate CVE-2025-62473, European organizations should implement the following specific measures: 1) Disable the Routing and Remote Access Service (RRAS) if it is not essential to business operations to eliminate the attack surface. 2) If RRAS is required, restrict its exposure by limiting access to trusted networks and IP addresses using firewall rules and network segmentation. 3) Employ network intrusion detection and prevention systems (IDS/IPS) to monitor and block suspicious packets targeting RRAS. 4) Enforce strict network access controls and multi-factor authentication for remote access services to reduce the risk of exploitation. 5) Regularly audit and monitor RRAS logs for unusual activity indicative of exploitation attempts. 6) Prepare for patch deployment by tracking Microsoft security advisories and applying updates promptly once available. 7) Educate IT staff and users about the risks of interacting with unsolicited network services and the importance of reporting anomalies. These targeted actions go beyond generic advice by focusing on RRAS-specific controls and proactive monitoring.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-62473: CWE-126: Buffer Over-read in Microsoft Windows 10 Version 1809
Description
Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
AI-Powered Analysis
Technical Analysis
CVE-2025-62473 is a buffer over-read vulnerability classified under CWE-126, affecting the Windows Routing and Remote Access Service (RRAS) component in Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability arises from improper bounds checking during the processing of network packets by RRAS, which can lead to reading beyond the intended buffer limits. This flaw allows an unauthenticated remote attacker to send specially crafted network packets to the RRAS service, causing it to disclose sensitive memory contents. The disclosed information could include sensitive data residing in memory, potentially aiding further attacks or reconnaissance. The vulnerability does not allow for code execution, privilege escalation, or denial of service, but it compromises confidentiality by leaking information. Exploitation requires no privileges but does require user interaction, likely in the form of triggering the RRAS service to process malicious input. The CVSS v3.1 base score is 6.5, reflecting a medium severity with high confidentiality impact, no impact on integrity or availability, low attack complexity, no privileges required, and user interaction needed. As of the publication date, no patches or known exploits are available, indicating the vulnerability is newly disclosed and unmitigated. Organizations running Windows 10 Version 1809 with RRAS enabled should consider this a significant risk for information disclosure over the network.
Potential Impact
For European organizations, the primary impact of CVE-2025-62473 is the unauthorized disclosure of sensitive information over the network, which can lead to exposure of confidential data, intellectual property, or internal network details. This information leakage could facilitate further targeted attacks such as phishing, lateral movement, or privilege escalation. Sectors with high reliance on RRAS for VPN or remote access, such as government agencies, financial institutions, healthcare providers, and critical infrastructure operators, are particularly vulnerable. The vulnerability does not directly affect system integrity or availability, so operational disruption is unlikely. However, the confidentiality breach could result in regulatory compliance issues under GDPR, leading to legal and financial penalties. The lack of available patches increases the window of exposure, necessitating immediate mitigation measures. The medium severity suggests a moderate risk level, but the potential for sensitive data leakage makes it a concern for organizations handling sensitive or regulated information.
Mitigation Recommendations
To mitigate CVE-2025-62473, European organizations should implement the following specific measures: 1) Disable the Routing and Remote Access Service (RRAS) if it is not essential to business operations to eliminate the attack surface. 2) If RRAS is required, restrict its exposure by limiting access to trusted networks and IP addresses using firewall rules and network segmentation. 3) Employ network intrusion detection and prevention systems (IDS/IPS) to monitor and block suspicious packets targeting RRAS. 4) Enforce strict network access controls and multi-factor authentication for remote access services to reduce the risk of exploitation. 5) Regularly audit and monitor RRAS logs for unusual activity indicative of exploitation attempts. 6) Prepare for patch deployment by tracking Microsoft security advisories and applying updates promptly once available. 7) Educate IT staff and users about the risks of interacting with unsolicited network services and the importance of reporting anomalies. These targeted actions go beyond generic advice by focusing on RRAS-specific controls and proactive monitoring.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-10-14T18:24:58.485Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693867e574ebaa3babafb397
Added to database: 12/9/2025, 6:18:13 PM
Last enriched: 12/9/2025, 6:34:29 PM
Last updated: 12/10/2025, 11:03:12 PM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67510: CWE-250: Execution with Unnecessary Privileges in neuron-core neuron-ai
CriticalCVE-2025-67513: CWE-521: Weak Password Requirements in FreePBX security-reporting
MediumCVE-2025-67505: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in okta okta-sdk-java
HighCVE-2025-67490: CWE-863: Incorrect Authorization in auth0 nextjs-auth0
MediumCVE-2025-13923
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.