CVE-2025-64678: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
AI Analysis
Technical Summary
CVE-2025-64678 is a heap-based buffer overflow vulnerability identified in the Windows Routing and Remote Access Service (RRAS) component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability stems from improper handling of input data within RRAS, leading to a buffer overflow condition on the heap. This flaw allows an attacker to send specially crafted network packets to a vulnerable system running RRAS, triggering the overflow and enabling remote code execution without requiring any prior authentication. The vulnerability is classified under CWE-122, which pertains to heap-based buffer overflows that can corrupt memory and alter program control flow. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with an attack vector over the network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R), and scope unchanged (S:U). The exploitability is significant because RRAS is a network-facing service often used in enterprise environments for VPN and routing functions. Although no known exploits have been reported in the wild as of the publication date, the vulnerability's public disclosure increases the risk of exploitation attempts. The absence of official patches at the time of disclosure necessitates immediate risk mitigation steps. The vulnerability affects only Windows 10 Version 1809, which is an older release but still in use in some organizations, particularly those with legacy systems or delayed upgrade cycles. Attackers exploiting this vulnerability could gain full control over affected systems, enabling data theft, lateral movement, or disruption of network services.
Potential Impact
For European organizations, the impact of CVE-2025-64678 can be severe, especially for those still operating Windows 10 Version 1809 with RRAS enabled. Successful exploitation could lead to unauthorized remote code execution, allowing attackers to compromise sensitive data, disrupt critical network routing services, or deploy ransomware and other malware. Industries such as telecommunications, finance, healthcare, and government agencies that rely on RRAS for VPN or routing services are particularly at risk. The confidentiality of personal and corporate data could be breached, integrity of network configurations compromised, and availability of essential services disrupted. Given the network-facing nature of RRAS, exploitation could be conducted remotely without authentication, increasing the threat surface. The vulnerability could facilitate lateral movement within corporate networks, escalating the scope of attacks. European organizations with strict data protection regulations (e.g., GDPR) face additional compliance risks if breaches occur due to this vulnerability. The lack of known exploits currently provides a window for proactive defense, but the high CVSS score indicates urgent attention is needed to prevent potential future attacks.
Mitigation Recommendations
1. Immediately assess the presence of Windows 10 Version 1809 systems running RRAS within the network. 2. Where possible, upgrade affected systems to a supported and patched Windows version that addresses this vulnerability. 3. If upgrading is not immediately feasible, disable the Routing and Remote Access Service on affected systems to eliminate the attack vector. 4. Implement network-level controls such as firewall rules to restrict inbound access to RRAS ports (e.g., PPTP, L2TP, SSTP) from untrusted networks. 5. Monitor network traffic for unusual or malformed packets targeting RRAS services that could indicate exploitation attempts. 6. Employ endpoint detection and response (EDR) solutions to detect anomalous process behavior indicative of exploitation. 7. Educate IT staff about the vulnerability and ensure incident response plans include procedures for this threat. 8. Regularly review and apply security advisories from Microsoft and related vendors for patches or mitigations as they become available. 9. Conduct vulnerability scans and penetration testing focused on RRAS to identify exposure. 10. Maintain robust backup and recovery processes to mitigate impact in case of compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Finland
CVE-2025-64678: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
Description
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
AI-Powered Analysis
Technical Analysis
CVE-2025-64678 is a heap-based buffer overflow vulnerability identified in the Windows Routing and Remote Access Service (RRAS) component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability stems from improper handling of input data within RRAS, leading to a buffer overflow condition on the heap. This flaw allows an attacker to send specially crafted network packets to a vulnerable system running RRAS, triggering the overflow and enabling remote code execution without requiring any prior authentication. The vulnerability is classified under CWE-122, which pertains to heap-based buffer overflows that can corrupt memory and alter program control flow. The CVSS v3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with an attack vector over the network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R), and scope unchanged (S:U). The exploitability is significant because RRAS is a network-facing service often used in enterprise environments for VPN and routing functions. Although no known exploits have been reported in the wild as of the publication date, the vulnerability's public disclosure increases the risk of exploitation attempts. The absence of official patches at the time of disclosure necessitates immediate risk mitigation steps. The vulnerability affects only Windows 10 Version 1809, which is an older release but still in use in some organizations, particularly those with legacy systems or delayed upgrade cycles. Attackers exploiting this vulnerability could gain full control over affected systems, enabling data theft, lateral movement, or disruption of network services.
Potential Impact
For European organizations, the impact of CVE-2025-64678 can be severe, especially for those still operating Windows 10 Version 1809 with RRAS enabled. Successful exploitation could lead to unauthorized remote code execution, allowing attackers to compromise sensitive data, disrupt critical network routing services, or deploy ransomware and other malware. Industries such as telecommunications, finance, healthcare, and government agencies that rely on RRAS for VPN or routing services are particularly at risk. The confidentiality of personal and corporate data could be breached, integrity of network configurations compromised, and availability of essential services disrupted. Given the network-facing nature of RRAS, exploitation could be conducted remotely without authentication, increasing the threat surface. The vulnerability could facilitate lateral movement within corporate networks, escalating the scope of attacks. European organizations with strict data protection regulations (e.g., GDPR) face additional compliance risks if breaches occur due to this vulnerability. The lack of known exploits currently provides a window for proactive defense, but the high CVSS score indicates urgent attention is needed to prevent potential future attacks.
Mitigation Recommendations
1. Immediately assess the presence of Windows 10 Version 1809 systems running RRAS within the network. 2. Where possible, upgrade affected systems to a supported and patched Windows version that addresses this vulnerability. 3. If upgrading is not immediately feasible, disable the Routing and Remote Access Service on affected systems to eliminate the attack vector. 4. Implement network-level controls such as firewall rules to restrict inbound access to RRAS ports (e.g., PPTP, L2TP, SSTP) from untrusted networks. 5. Monitor network traffic for unusual or malformed packets targeting RRAS services that could indicate exploitation attempts. 6. Employ endpoint detection and response (EDR) solutions to detect anomalous process behavior indicative of exploitation. 7. Educate IT staff about the vulnerability and ensure incident response plans include procedures for this threat. 8. Regularly review and apply security advisories from Microsoft and related vendors for patches or mitigations as they become available. 9. Conduct vulnerability scans and penetration testing focused on RRAS to identify exposure. 10. Maintain robust backup and recovery processes to mitigate impact in case of compromise.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-11-06T23:40:37.277Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693867eb74ebaa3babafb7f3
Added to database: 12/9/2025, 6:18:19 PM
Last enriched: 12/9/2025, 6:21:08 PM
Last updated: 12/11/2025, 7:31:56 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14512: Integer Overflow or Wraparound in Red Hat Red Hat Enterprise Linux 10
MediumCVE-2025-67694
UnknownCVE-2025-67693
UnknownCVE-2025-67692
UnknownCVE-2025-67691
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.