SB2025111152 - Multiple vulnerabilities in Microsoft Windows Routing and Remote Access Service (RRAS)
Published: November 11, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Heap-based buffer overflow (CVE-ID: CVE-2025-60715)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Windows Routing and Remote Access Service (RRAS). A remote user can trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
2) Heap-based buffer overflow (CVE-ID: CVE-2025-62452)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Windows Routing and Remote Access Service (RRAS). A remote user can trigger a heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
3) Link following (CVE-ID: CVE-2025-59510)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an insecure link following issue in Windows Routing and Remote Access Service (RRAS). A local user can create a specially crafted symbolic link to a critical file on the system and cause a denial of service condition on the target system.
4) Untrusted Pointer Dereference (CVE-ID: CVE-2025-60713)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to untrusted pointer dereference in Windows Routing and Remote Access Service (RRAS). A local user can gain elevated privileges on the target system.
Remediation
Install update from vendor's website.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-60715
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-62452
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-59510
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2025-60713