Cyber Posture

CVE-2026-25172

High

Published: 10 March 2026

Published
10 March 2026
Modified
13 March 2026
KEV Added
Patch
CVSS Score 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0004 12.3th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-25172 is a high-severity Heap-based Buffer Overflow (CWE-122) vulnerability in Microsoft Windows Server 2012. Its CVSS base score is 8.0 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation of Remote Services (T1210); ranked at the 12.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation of Remote Services (T1210). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the integer overflow vulnerability in RRAS by requiring timely identification, reporting, and application of vendor-provided patches.

prevent

Implements memory protections such as ASLR and DEP that prevent successful exploitation of heap-based buffer overflows triggered by the integer overflow in RRAS.

prevent

Reduces exposure to the RRAS vulnerability by disabling or restricting unnecessary routing and remote access functionality when not required.

MITRE ATT&CK Enterprise TechniquesAI

T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
Why these techniques?

Integer overflow leading to heap buffer overflow in the RRAS remote service enables remote code execution by an authenticated network attacker (AV:N/PR:L), directly matching exploitation of remote services for unauthorized code execution and system access.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.

Deeper analysisAI

CVE-2026-25172 is an integer overflow or wraparound vulnerability in the Windows Routing and Remote Access Service (RRAS). Published on 2026-03-10T18:18:31.623, it carries a CVSS v3.1 base score of 8.0 (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H) and maps to CWEs 122 (Heap-based Buffer Overflow) and 190 (Integer Overflow or Wraparound).

The vulnerability allows an authorized attacker to execute code over a network. Exploitation requires low privileges (PR:L), network access (AV:N), low attack complexity (AC:L), and user interaction (UI:R), with no change in scope (S:U). Successful attacks can result in high impacts to confidentiality, integrity, and availability.

Microsoft has published an update guide with details on the vulnerability at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-25172.

Details

CWE(s)

Affected Products

microsoft
windows server 2012
all versions, r2
microsoft
windows server 2016
≤ 10.0.14393.8957
microsoft
windows server 2019
≤ 10.0.17763.8511
microsoft
windows server 2022
≤ 10.0.20348.4830
microsoft
windows server 2022 23h2
≤ 10.0.25398.2207
microsoft
windows server 2025
≤ 10.0.26100.32463

CVEs Like This One

CVE-2025-49757Same product: Microsoft Windows Server 2012
CVE-2025-49676Same product: Microsoft Windows Server 2012
CVE-2025-49657Same product: Microsoft Windows Server 2012
CVE-2025-54106Same product: Microsoft Windows Server 2012
CVE-2025-24045Same product: Microsoft Windows Server 2012
CVE-2025-49688Same product: Microsoft Windows Server 2012
CVE-2026-26111Same product: Microsoft Windows Server 2012
CVE-2025-47998Same product: Microsoft Windows Server 2012
CVE-2025-49729Same product: Microsoft Windows Server 2012
CVE-2025-49669Same product: Microsoft Windows Server 2012

References