A newly disclosed vulnerability in Windows Routing and Remote Access Service (RRAS) — tracked as CVE-2025-53806 in the Microsoft Security Response Center entry provided by the reporter — is an out‑of‑bounds read / buffer over‑read that can allow an attacker to obtain memory contents from an...
Microsoft has assigned CVE-2025-53796 to a newly disclosed vulnerability in the Windows Routing and Remote Access Service (RRAS) that can cause a buffer over‑read / use of an uninitialized resource, allowing an attacker to disclose memory contents over a network; organizations that run RRAS as a...
CVE-2025-55225 is an out‑of‑bounds read (information‑disclosure) vulnerability in the Windows Routing and Remote Access Service (RRAS) that can allow a remote attacker to cause RRAS to return memory contents it should not disclose.
Overview
What it is: an out‑of‑bounds read /...
CVE-2025-54097 — Windows RRAS Information‑Disclosure Vulnerability
An in‑depth feature for security teams and administrators
Summary
What it is: An out‑of‑bounds read in the Windows Routing and Remote Access Service (RRAS) that can cause RRAS to disclose contents of memory to a remote...
Microsoft’s Security Response Center lists CVE-2025-54095 as an out-of-bounds read in the Windows Routing and Remote Access Service (RRAS) that can disclose memory contents to a remote attacker over the network. Background / Overview
Routing and Remote Access Service (RRAS) is a long‑standing...
Microsoft has published an advisory for CVE-2025-54096, a vulnerability in the Windows Routing and Remote Access Service (RRAS) that allows an out-of-bounds read and can be abused by a remote attacker to disclose sensitive information over a network — a high-priority fix for any server running...
Microsoft has released security updates addressing a dangerous heap-based buffer overflow in the Windows Routing and Remote Access Service (RRAS) that can allow remote code execution against RRAS-enabled servers; administrators should treat this as a high-priority patching event, verify the...
A newly disclosed heap-based buffer overflow in the Windows Routing and Remote Access Service (RRAS) — tracked as CVE-2025-50163 — allows remote, unauthenticated attackers to execute arbitrary code over a network against servers running RRAS, elevating the threat posture for any organization...
Title: CVE-2025-50156 — Windows Routing and Remote Access Service (RRAS) Information Disclosure (Uninitialized Resource)
Executive summary
What happened: An information-disclosure vulnerability (CVE-2025-50156) was reported in Windows Routing and Remote Access Service (RRAS). The flaw is caused...
cve-2025-50156
firewall hardening
gre
ikev2
incident response
information disclosure
ipsec
network security
patch management
pptp
rras
rras vulnerability
segmentation
siem
sstp
threat hunting
vpn
windows security
windows server
windows update
In a significant shift destined to impact IT administrators and security-savvy users across the globe, Microsoft has taken a bold step by officially deprecating two widely used Virtual Private Network (VPN) protocols: the Point-to-Point Tunneling Protocol (PPTP) and Layer 2 Tunneling Protocol...
Having an issue with a VPN.
The VPN is a basic PPTP VPN which is setup on our Firewall, for a user to connect the simply create a new VPN point it to our IP and log in with a username and password.
The test machine im using is a laptop running Windows 7 64-BIT Professional.
I can connect to...
Revision Note: V1.0 (August 20, 2012): Advisory published.
Summary: Microsoft is aware that detailed exploit code has been published for known weaknesses in the Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2). The MS-CHAP v2 protocol is widely used as an...
Today, we published Security Advisory 2743314, which provides guidance that will help protect customers from a technique that could allow a man-in-the middle attack to obtain a user’s domain credentials when VPN is configured to use PPTP and MSCHAPv2.
Customers concerned with this...
Revision Note: V1.0 (August 20, 2012): Advisory published.
Summary: Microsoft is aware that detailed exploit code has been published for known weaknesses in the Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2). The MS-CHAP v2 protocol is widely used as an...
Provides recommendations for organizations that use MS-CHAP v2/PPTP to implement the Protected Extensible Authentication Protocol (PEAP) in their networks. This mitigates known attacks by encapsulating the MS-CHAP v2 authentication traffic in TLS.
More...
Hi
I am having problems getting VPN connections to work for power users, details below:
- Client machines are domain computers (2003 domain funct lvl), running Win7 pro (64bit)
- Users are domain users, with power user, and network configuration, local machine membership.
- UAC has been...
So I've tried to set up a PPTP connection for browsing through that. It works fine upon initial connection but after a seemingly random amount of minutes it stops working and goes from "Internet access" to "No network access" (still connected to the VPN server).
My wireless connection has...
I have a windows 7 ultimate setup at home allowing a VPN connections via ptppp using the incoming setup.
I set up the Client which is my Ipad 2 the connection goes through fine authenticating and then connected internally within the network and externally outside the network. Everything seems...