First published: Tue Apr 08 2025(Updated: )
<p>Buffer over-read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.</p>
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Windows 11 | =23H2 | |
Microsoft Windows Server 2025 | ||
Windows 10 | =1809 | |
Windows 10 | =1607 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2025 | ||
Microsoft Windows Server | ||
Windows 10 | =22H2 | |
Windows 10 | =21H2 | |
Microsoft Windows Server | ||
Microsoft Windows Server 2008 R2 | ||
Windows 10 | =22H2 | |
Microsoft Windows Server 2022 23H2 | ||
Windows 10 | =21H2 | |
Microsoft Windows Server | ||
Windows 11 | =22H2 | |
Windows 10 | =21H2 | |
Windows 11 | =24H2 | |
Windows 10 | =1607 | |
Windows 10 | =1809 | |
Microsoft Windows Server 2022 | ||
Windows 11 | =22H2 | |
Windows 11 | =24H2 | |
Microsoft Windows Server | ||
Microsoft Windows Server 2008 R2 | ||
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2012 R2 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server 2012 R2 | ||
Windows 10 | =22H2 | |
Windows 11 | =23H2 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2019 | ||
Windows 10 | ||
Windows 10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-26672 has been rated with a severity level that allows unauthorized attackers to disclose sensitive information over a network.
To fix CVE-2025-26672, apply the relevant security updates and patches provided by Microsoft for affected Windows versions.
CVE-2025-26672 affects multiple Windows versions including Windows 10, Windows 11, and various editions of Windows Server.
Yes, CVE-2025-26672 can be exploited by an unauthorized attacker remotely to obtain sensitive information.
Currently, the primary mitigation for CVE-2025-26672 is to apply the available patches rather than relying on workarounds.