Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62549: CWE-822: Untrusted Pointer Dereference in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-62549cvecve-2025-62549cwe-822
Published: Tue Dec 09 2025 (12/09/2025, 17:55:38 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Untrusted pointer dereference in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.

AI-Powered Analysis

AILast updated: 01/08/2026, 00:52:49 UTC

Technical Analysis

CVE-2025-62549 is a vulnerability classified under CWE-822 (Untrusted Pointer Dereference) found in Microsoft Windows 10 Version 1809, specifically in the Routing and Remote Access Service (RRAS). This flaw allows an attacker to remotely execute arbitrary code by exploiting improper handling of pointers within RRAS. The vulnerability is exploitable over the network without requiring any privileges, although it does require user interaction, such as triggering a crafted network request. The vulnerability impacts confidentiality, integrity, and availability, as successful exploitation can lead to full system compromise. The CVSS v3.1 base score is 8.8, indicating high severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), and scope unchanged (S:U). The vulnerability was published on December 9, 2025, with no known exploits in the wild at this time. RRAS is a critical Windows component used for routing and remote access services, often deployed in enterprise networks to support VPNs and remote connectivity. The flaw arises from dereferencing pointers that are not properly validated, allowing attackers to manipulate memory and execute arbitrary code remotely. This can lead to unauthorized access, data breaches, and disruption of network services. The lack of available patches at the time of disclosure increases the urgency for organizations to implement interim mitigations and monitor for suspicious activity. Given the widespread use of Windows 10 Version 1809 in corporate environments, this vulnerability poses a significant risk to network security and operational continuity.

Potential Impact

For European organizations, the impact of CVE-2025-62549 could be severe due to the widespread deployment of Windows 10 Version 1809 in enterprise environments, including government, healthcare, finance, and critical infrastructure sectors. Exploitation could lead to unauthorized remote code execution, allowing attackers to gain control over affected systems, exfiltrate sensitive data, disrupt network services, or deploy ransomware. The vulnerability affects RRAS, which is commonly used to provide VPN and remote access capabilities; thus, exploitation could compromise remote access infrastructure, potentially affecting large numbers of users and systems. This could result in significant operational disruption, data loss, and reputational damage. Additionally, the vulnerability's network-based attack vector increases the risk of widespread exploitation, especially in organizations with exposed RRAS endpoints. The requirement for user interaction may limit automated exploitation but does not eliminate risk, particularly in environments with social engineering or phishing threats. Overall, the vulnerability poses a high risk to confidentiality, integrity, and availability of critical systems in European organizations.

Mitigation Recommendations

1. Apply official security patches from Microsoft as soon as they become available to address the vulnerability directly. 2. Until patches are released, restrict exposure of RRAS services to untrusted networks by implementing strict firewall rules and network segmentation. 3. Disable RRAS if it is not required or replace it with alternative secure remote access solutions. 4. Monitor network traffic for unusual or suspicious activity targeting RRAS endpoints, including malformed packets or unexpected connection attempts. 5. Implement strong user awareness training to reduce the risk of user interaction-based exploitation, emphasizing caution with unsolicited network requests or prompts. 6. Employ endpoint detection and response (EDR) tools to detect and respond to potential exploitation attempts. 7. Regularly audit and update remote access configurations to ensure they follow security best practices, including multi-factor authentication and least privilege principles. 8. Maintain up-to-date asset inventories to quickly identify and remediate affected systems running Windows 10 Version 1809.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-10-15T17:11:21.219Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693867e574ebaa3babafb39d

Added to database: 12/9/2025, 6:18:13 PM

Last enriched: 1/8/2026, 12:52:49 AM

Last updated: 2/4/2026, 11:06:54 PM

Views: 85

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats