Windows Remote Access Connection Manager Vulnerability Enables Arbitrary Code Execution

Windows Remote Access Connection Manager Vulnerability Enables Arbitrary Code Execution

Windows Remote Access Connection Manager Vulnerability

A critical security issue involving the Windows Remote Access Connection Manager (RasMan) that allows local attackers to execute arbitrary code with System privileges.

While investigating CVE-2025-59230, the vulnerability that Microsoft addressed in the October 2025 security updates. 0patch security analysts discovered a complex exploit chain that relies on a secondary, previously unknown zero-day flaw to function effectively.

The primary vulnerability, CVE-2025-59230, centers on how the RasMan service handles RPC endpoints. When the service starts, it registers a specific endpoint that other privileged services trust.

0patch researchers found that if RasMan is not running, an attacker can register this endpoint first.

Feature Details
CVE ID CVE-2025-59230
Component Windows Remote Access Connection Manager (RasMan)
Vulnerability Type Elevation of Privilege (EoP)
Impact Local Arbitrary Code Execution as System
Affected Platforms Windows 10, Windows 11, Windows Server 2008-2025

Once the privileged services attempt to connect, they unknowingly communicate with the attacker’s process, allowing for the execution of malicious commands.

However, exploiting this race condition is difficult because RasMan typically launches automatically at system startup, leaving attackers no window of opportunity to register the endpoint first.

google

To bypass this limitation, the discovered exploit utilizes a second, unpatched vulnerability. This zero-day flaw allows a non-privileged user to intentionally crash the RasMan service.

The crash is caused by a logic error in the code involving a circular linked list. The service attempts to traverse the list but fails to properly handle NULL pointers, resulting in a memory access violation.

By crashing the service, attackers can force it into a stopped state, release the RPC endpoint, and subsequently trigger the CVE-2025-59230 exploitation chain to gain System access.

Microsoft has released official patches for the elevation-of-privilege flaw (CVE-2025-59230). However, the service crash vulnerability used to facilitate the attack remained unpatched in official channels at the time of discovery.

0patch has released micropatches to address this crash vector across supported platforms, including Windows 11 and Server 2025.

Administrators are advised to apply the October 2025 Windows updates immediately to mitigate the primary privilege escalation risk.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews



Source link