Impact
A heap‑based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute arbitrary code over a network connection. The vulnerability can compromise confidentiality, integrity, and availability of the affected system, giving the attacker full control of the host.
Affected Systems
Microsoft Windows 10 versions 1607, 1809, 21H2, and 22H2; Windows 11 versions 23H2, 24H2, 25H2, and 22H3; Windows Server 2008 R2 Service Pack 1 (regular and Server Core), Windows Server 2008 Service Pack 2, Windows Server 2012 and 2012 R2 (regular and Server Core), Windows Server 2016, 2019, 2022, and 2025.
Risk and Exploitability
The CVSS score of 8.8 classifies the flaw as high severity, but the EPSS score of less than 1 % indicates a very low likelihood of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog, likely meaning no confirmed exploits exist yet. The attack vector is inferred to be network‑based, requiring no special privileges and permitting remote code execution from an external actor.
OpenCVE Enrichment