CVE-2026-25172
HIGH
8,0
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: low
User Interaction: required
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
Description
AI Translation Available
Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0009
Percentile
0,2th
Updated
EPSS Score Trend (Last 6 Days)
122
Heap-based Buffer Overflow
DraftCommon Consequences
Security Scopes Affected:
Availability
Integrity
Confidentiality
Access Control
Other
Potential Impacts:
Dos: Crash, Exit, Or Restart
Dos: Resource Consumption (Cpu)
Dos: Resource Consumption (Memory)
Execute Unauthorized Code Or Commands
Bypass Protection Mechanism
Modify Memory
Other
Applicable Platforms
Languages:
C, C++, Memory-Unsafe
190
Integer Overflow or Wraparound
StableCommon Consequences
Security Scopes Affected:
Availability
Integrity
Confidentiality
Access Control
Other
Potential Impacts:
Dos: Crash, Exit, Or Restart
Dos: Resource Consumption (Memory)
Dos: Instability
Modify Memory
Execute Unauthorized Code Or Commands
Bypass Protection Mechanism
Alter Execution Logic
Dos: Resource Consumption (Cpu)
Applicable Platforms
Languages:
C, Not Language-Specific
Operating System
Windows Server 2025 by Microsoft
Version Range Affected
To
10.0.26100.32463
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Windows Server 2019 by Microsoft
Version Range Affected
To
10.0.17763.8511
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Windows Server 2022 23H2 by Microsoft
Version Range Affected
To
10.0.25398.2207
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Windows Server 2012 by Microsoft
CPE Identifier
View Detailed Analysis
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Windows Server 2022 by Microsoft
Version Range Affected
To
10.0.20348.4830
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Windows Server 2012 by Microsoft
CPE Identifier
View Detailed Analysis
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Windows Server 2016 by Microsoft
Version Range Affected
To
10.0.14393.8957
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-25172