CVE-2025-48824
Heap-based buffer overflow in Windows Routing and Remote Access Service
Description
Description
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Affected Vendors & Products
| Vendor | Product | Version |
|---|---|---|
| microsoft | windows_server_2008 | * |
| microsoft | windows_server_2008 | * |
| microsoft | windows_server_2012 | * |
| microsoft | windows_server_2012 | r2 |
| microsoft | windows_server_2019 | to 10.0.17763.1999 (inc) |
| microsoft | windows_server_2022_23h2 | to 10.0.20348.2762 (inc) |
| microsoft | windows_server_2025 | to 10.0.26100.3403 (inc) |
| microsoft | windows_server_2008 | r2 |
| microsoft | windows_server_2016 | to 10.0.14393.4467 (inc) |
| microsoft | windows_server_2022 | to 10.0.20348.2762 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-122 | A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc(). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
How can this vulnerability impact me? :
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart
Meta Information
CVE Publication Date:
2025-07-08
CVE Last Modified Date:
2025-07-15
Report Generation Date:
2025-11-02
AI Powered Q&A Generation:
2025-07-08
EPSS Last Evaluated Date:
2025-09-10
NVD Report Link: