Beyond the Perimeter: How to See Every Threat in Hybrid Networks

CVE-2026-25172

CVE-2026-25172 Explained: Remote Code Execution in Windows RRAS Triggered by Integer Overflow Conditions

CVSS Gauge
CVSS Needle

Summary

When processing manipulated network traffic, CVE-2026-25172, a high-severity remote code execution vulnerability in Windows RRAS, can cause heap memory corruption due to wraparound or integer overflow problems, potentially allowing arbitrary code execution. It impacts a number of Windows client and server versions with RRAS enabled, such as Windows Server 2012-2025 and various versions of Windows 10 and Windows 11.

In order to resolve it, Microsoft released security updates in March 2026 that included cumulative patches and the KB5084597 hotpatch for Windows 11 enterprise systems that were supported. In hotpatch-enabled environments, some of the solutions were designed to be deployed without a system reboot.

Urgent Actions Required

Which Systems Are Vulnerable to CVE-2026-25172?

Technical Overview

How Does the CVE-2026-25172 Exploit Work?

The attack typically follows these steps:

CVE-2026-25172

What Causes CVE-2026-25172?

Vulnerability Root Cause:

This vulnerability arises from improper handling of integer values within the Windows Routing and Remote Access Service. When processing crafted network input, integer values can overflow or wraparound, resulting in incorrect memory allocation. This leads to a heap-based buffer overflow condition, allowing memory corruption that can be leveraged to execute arbitrary code over a network.

How Can You Mitigate CVE-2026-25172?

If immediate patching is delayed or not possible:

  • Disable Windows Routing and Remote Access Service if not needed.
  • Restrict access using firewalls and network segmentation.
  • Allow only trusted sources to reach RRAS.
  • Monitor RRAS traffic for abnormal or malformed requests.
  • Apply Microsoft security updates promptly.

Which Assets and Systems Are at Risk?

Will Patching CVE-2026-25172 Cause Downtime?

Patch application impact: Moderate. Microsoft released security and hotpatch updates for CVE-2026-25172 across affected Windows systems. Some installations may require updates and system restarts depending on configuration.

Mitigation (if immediate patching is not possible): Disable RRAS if not needed. Restrict access with firewalls and segmentation. Monitor traffic for anomalies. Apply Microsoft security updates for full mitigation.

How Can You Detect CVE-2026-25172 Exploitation?

Exploitation Signatures:

Look for abnormal or crafted network traffic targeting the Windows Routing and Remote Access Service that triggers unexpected processing of integer values. Indicators may include malformed requests that cause service errors, instability, or crashes.

Indicators of Compromise (IOCs/IOAs):

Behavioral Indicators:

Alerting Strategy:

Remediation & Response

Compliance & Governance Notes

CVSS Breakdown Table

MetricValue Description
Base Score8.0High severity vulnerability affecting Windows Routing and Remote Access Service
Attack VectorNetwork Exploitable remotely over a network via crafted traffic
Attack ComplexityLowExploitation does not require special conditions
Privileges RequiredLowSome sources indicate that low privileges, or authorized access may be required
User Interaction RequiredSome scenarios require user action, such as interacting with a malicious server
Scope Unchanged Impact remains within the vulnerable Windows Routing and Remote Access Service context
Confidentiality Impact HighExploitation can lead to the exposure of sensitive system information through code execution
Integrity Impact HighAttacker can execute arbitrary code and alter system behavior
Availability ImpactHighSuccessful exploitation can disrupt services through system compromise or instability

Related Readings

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.