CVE Alert: CVE-2025-54106 – Microsoft – Windows Server 2019

CVE-2025-54106

HIGHNo exploitation known

Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.

CVSS v3.1 (8.8)
Vendor
Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft, Microsoft
Product
Windows Server 2019, Windows Server 2019 (Server Core installation), Windows Server 2022, Windows Server 2025 (Server Core installation), Windows Server 2022, 23H2 Edition (Server Core installation), Windows Server 2025, Windows Server 2016, Windows Server 2016 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 R2 (Server Core installation)
Versions
10.0.17763.0 lt 10.0.17763.7792 | 10.0.17763.0 lt 10.0.17763.7792 | 10.0.20348.0 lt 10.0.20348.4171 | 10.0.26100.0 lt 10.0.26100.6584 | 10.0.25398.0 lt 10.0.25398.1849 | 10.0.26100.0 lt 10.0.26100.6584 | 10.0.14393.0 lt 10.0.14393.8422 | 10.0.14393.0 lt 10.0.14393.8422 | 6.3.9600.0 lt 6.3.9600.22774 | 6.3.9600.0 lt 6.3.9600.22774
CWE
CWE-190, CWE-190: Integer Overflow or Wraparound
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Published
2025-09-09T17:00:49.707Z
Updated
2025-09-10T03:55:41.734Z

AI Summary Analysis

Risk verdict

High risk of remote code execution via RRAS, with total impact potential; exploitation activity is not indicated as active at present, but the CVSS severity remains high.

Why this matters

RRAS often functions as a VPN/remote-access gateway on Windows Server, exposing an attractive foothold to attackers. A successful exploit could yield full system control and enable rapid lateral movement within the domain, compromising key assets and credentials.

Most likely attack path

Attacker targets a reachable RRAS endpoint over the network. The vulnerability has no required local privileges, but user interaction is indicated, meaning social engineering or triggering a user-involved flow may be necessary. Once triggered, code execution with high integrity is possible, enabling complete compromise of the host and potential expansion to other systems in the network.

Who is most exposed

Servers configured to provide RRAS-based remote access, VPN gateways, or site-to-site VPN relays are most at risk. Organisations with RRAS enabled in exposed network segments (including DMZ or internet-facing deployments) are particularly vulnerable.

Detection ideas

  • Unusual RRAS service activity or crashes; kernel/memory error dumps referencing RRAS.
  • Abnormal network traffic to RRAS endpoints or unexpected crafted packets.
  • Sudden spikes in authentication or remote-access connection failures correlated with RRAS events.
  • Security logs showing anomalous code execution indicators around RRAS processes.

Mitigation and prioritisation

  • Apply Microsoft-supplied patches for affected Windows Server versions; verify build versions and update to non-affected releases.
  • If RRAS is not required, disable the service or restrict access to trusted networks; enforce network segmentation.
  • Enforce MFA and strong access controls for VPN/auth flows; implement strict firewall rules to limit RRAS exposure.
  • Establish monitoring for RRAS process integrity and related event logs; enable automatic updates where feasible.
  • Schedule patching and validation under Change Control; coordinate with IT operations to minimise downtime.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.