BDU:2025-14168
Vulnerability from fstec - Published: 11.11.2025
VLAI Severity ?
Title
Уязвимость службы Routing and Remote Access Service (RRAS) операционных систем Windows, позволяющая нарушителю вызвать отказ в обслуживании
Description
Уязвимость службы Routing and Remote Access Service (RRAS) операционных систем Windows связана с некорректным определением символических ссылок перед доступом к файлу. Эксплуатация уязвимости может позволить нарушителю вызвать отказ в обслуживании
Severity ?
Vendor
Microsoft Corp
Software Name
Windows Server 2022 (Server Core installation), Windows Server 2022, Windows Server 2019 (Server Core installation), Windows Server 2019, Windows Server 2016 (Server Core installation), Windows Server 2016, Windows Server 2025, Windows Server 2022, 23H2 Edition (Server Core installation), Windows Server 2025 (Server Core installation), Windows 11 24H2, Windows 11 23H2, Windows 11 25H2, Windows 10 22H2, Windows 10 21H2, Windows 10 1809, Windows 10 1607, Windows Server 2012 R2 (Server Core installation), Windows Server 2012 R2
Software Version
до 10.0.20348.4405 (Windows Server 2022 (Server Core installation)), до 10.0.20348.4346 (Windows Server 2022 (Server Core installation)), до 10.0.20348.4405 (Windows Server 2022), до 10.0.20348.4346 (Windows Server 2022), до 10.0.17763.8027 (Windows Server 2019 (Server Core installation)), до 10.0.17763.8027 (Windows Server 2019), до 10.0.14393.8594 (Windows Server 2016 (Server Core installation)), до 10.0.14393.8594 (Windows Server 2016), до 10.0.26100.7171 (Windows Server 2025), до 10.0.26100.7092 (Windows Server 2025), до 10.0.25398.1965 (Windows Server 2022, 23H2 Edition (Server Core installation)), до 10.0.26100.7171 (Windows Server 2025 (Server Core installation)), до 10.0.26100.7092 (Windows Server 2025 (Server Core installation)), до 10.0.26100.7171 (Windows 11 24H2), до 10.0.26100.7092 (Windows 11 24H2), до 10.0.22631.6199 (Windows 11 23H2), до 10.0.26200.7171 (Windows 11 25H2), до 10.0.26200.7092 (Windows 11 25H2), до 10.0.19045.6575 (Windows 10 22H2), до 10.0.19044.6575 (Windows 10 21H2), до 10.0.17763.8027 (Windows 10 1809), до 10.0.14393.8594 (Windows 10 1607), до 6.3.9600.22869 (Windows Server 2012 R2 (Server Core installation)), до 6.3.9600.22869 (Windows Server 2012 R2)
Possible Mitigations
Использование рекомендаций:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59510
Reference
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59510
CWE
CWE-59
{
"CVSS 2.0": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "TO2382, TO2383, TO2384, TO2388, TO2389",
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": "TO2382 \u041d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f Windows Server 2022 21H2 \u0434\u043b\u044f x64 \u0441\u0438\u0441\u0442\u0435\u043c (KB5068787), TO2383 \u041d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f Windows 11 23H2 \u0434\u043b\u044f x64 \u0441\u0438\u0441\u0442\u0435\u043c (KB5068865), TO2384 \u041d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f Windows 10 21H2 \u0434\u043b\u044f x64 \u0441\u0438\u0441\u0442\u0435\u043c (KB5068781), TO2388 \u041d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f Windows Server 2016 \u0434\u043b\u044f x64 \u0441\u0438\u0441\u0442\u0435\u043c (KB5068864), TO2389 \u041d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f Windows 10 1809 \u0434\u043b\u044f x64 \u0441\u0438\u0441\u0442\u0435\u043c (KB5068791)",
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Microsoft Corp",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u0434\u043e 10.0.20348.4405 (Windows Server 2022 (Server Core installation)), \u0434\u043e 10.0.20348.4346 (Windows Server 2022 (Server Core installation)), \u0434\u043e 10.0.20348.4405 (Windows Server 2022), \u0434\u043e 10.0.20348.4346 (Windows Server 2022), \u0434\u043e 10.0.17763.8027 (Windows Server 2019 (Server Core installation)), \u0434\u043e 10.0.17763.8027 (Windows Server 2019), \u0434\u043e 10.0.14393.8594 (Windows Server 2016 (Server Core installation)), \u0434\u043e 10.0.14393.8594 (Windows Server 2016), \u0434\u043e 10.0.26100.7171 (Windows Server 2025), \u0434\u043e 10.0.26100.7092 (Windows Server 2025), \u0434\u043e 10.0.25398.1965 (Windows Server 2022, 23H2 Edition (Server Core installation)), \u0434\u043e 10.0.26100.7171 (Windows Server 2025 (Server Core installation)), \u0434\u043e 10.0.26100.7092 (Windows Server 2025 (Server Core installation)), \u0434\u043e 10.0.26100.7171 (Windows 11 24H2), \u0434\u043e 10.0.26100.7092 (Windows 11 24H2), \u0434\u043e 10.0.22631.6199 (Windows 11 23H2), \u0434\u043e 10.0.26200.7171 (Windows 11 25H2), \u0434\u043e 10.0.26200.7092 (Windows 11 25H2), \u0434\u043e 10.0.19045.6575 (Windows 10 22H2), \u0434\u043e 10.0.19044.6575 (Windows 10 21H2), \u0434\u043e 10.0.17763.8027 (Windows 10 1809), \u0434\u043e 10.0.14393.8594 (Windows 10 1607), \u0434\u043e 6.3.9600.22869 (Windows Server 2012 R2 (Server Core installation)), \u0434\u043e 6.3.9600.22869 (Windows Server 2012 R2)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59510",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "11.11.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "14.11.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "14.11.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-14168",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-59510",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Windows Server 2022 (Server Core installation), Windows Server 2022, Windows Server 2019 (Server Core installation), Windows Server 2019, Windows Server 2016 (Server Core installation), Windows Server 2016, Windows Server 2025, Windows Server 2022, 23H2 Edition (Server Core installation), Windows Server 2025 (Server Core installation), Windows 11 24H2, Windows 11 23H2, Windows 11 25H2, Windows 10 22H2, Windows 10 21H2, Windows 10 1809, Windows 10 1607, Windows Server 2012 R2 (Server Core installation), Windows Server 2012 R2",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Microsoft Corp Windows Server 2022 (Server Core installation) \u0434\u043e 10.0.20348.4405 , Microsoft Corp Windows Server 2022 (Server Core installation) \u0434\u043e 10.0.20348.4346 , Microsoft Corp Windows Server 2022 \u0434\u043e 10.0.20348.4405 , Microsoft Corp Windows Server 2022 \u0434\u043e 10.0.20348.4346 , Microsoft Corp Windows Server 2019 (Server Core installation) \u0434\u043e 10.0.17763.8027 , Microsoft Corp Windows Server 2019 \u0434\u043e 10.0.17763.8027 , Microsoft Corp Windows Server 2016 (Server Core installation) \u0434\u043e 10.0.14393.8594 , Microsoft Corp Windows Server 2016 \u0434\u043e 10.0.14393.8594 , Microsoft Corp Windows Server 2025 \u0434\u043e 10.0.26100.7171 , Microsoft Corp Windows Server 2025 \u0434\u043e 10.0.26100.7092 , Microsoft Corp Windows Server 2022, 23H2 Edition (Server Core installation) \u0434\u043e 10.0.25398.1965 , Microsoft Corp Windows Server 2025 (Server Core installation) \u0434\u043e 10.0.26100.7171 , Microsoft Corp Windows Server 2025 (Server Core installation) \u0434\u043e 10.0.26100.7092 , Microsoft Corp Windows 11 24H2 \u0434\u043e 10.0.26100.7171 64-bit, Microsoft Corp Windows 11 24H2 \u0434\u043e 10.0.26100.7092 64-bit, Microsoft Corp Windows 11 24H2 \u0434\u043e 10.0.26100.7171 ARM64, Microsoft Corp Windows 11 24H2 \u0434\u043e 10.0.26100.7092 ARM64, Microsoft Corp Windows 11 23H2 \u0434\u043e 10.0.22631.6199 64-bit, Microsoft Corp Windows 11 23H2 \u0434\u043e 10.0.22631.6199 ARM64, Microsoft Corp Windows 11 25H2 \u0434\u043e 10.0.26200.7171 64-bit, Microsoft Corp Windows 11 25H2 \u0434\u043e 10.0.26200.7092 64-bit, Microsoft Corp Windows 11 25H2 \u0434\u043e 10.0.26200.7171 ARM64, Microsoft Corp Windows 11 25H2 \u0434\u043e 10.0.26200.7092 ARM64, Microsoft Corp Windows 10 22H2 \u0434\u043e 10.0.19045.6575 32-bit, Microsoft Corp Windows 10 22H2 \u0434\u043e 10.0.19045.6575 ARM64, Microsoft Corp Windows 10 22H2 \u0434\u043e 10.0.19045.6575 64-bit, Microsoft Corp Windows 10 21H2 \u0434\u043e 10.0.19044.6575 64-bit, Microsoft Corp Windows 10 21H2 \u0434\u043e 10.0.19044.6575 ARM64, Microsoft Corp Windows 10 21H2 \u0434\u043e 10.0.19044.6575 32-bit, Microsoft Corp Windows 10 1809 \u0434\u043e 10.0.17763.8027 64-bit, Microsoft Corp Windows 10 1809 \u0434\u043e 10.0.17763.8027 32-bit, Microsoft Corp Windows 10 1607 \u0434\u043e 10.0.14393.8594 64-bit, Microsoft Corp Windows 10 1607 \u0434\u043e 10.0.14393.8594 32-bit, Microsoft Corp Windows Server 2012 R2 (Server Core installation) \u0434\u043e 6.3.9600.22869 , Microsoft Corp Windows Server 2012 R2 \u0434\u043e 6.3.9600.22869 ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u043b\u0443\u0436\u0431\u044b Routing and Remote Access Service (RRAS) \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c Windows, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0432\u0435\u0440\u043d\u043e\u0435 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u0438\u0435 \u0441\u0441\u044b\u043b\u043a\u0438 \u043f\u0435\u0440\u0435\u0434 \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c \u043a \u0444\u0430\u0439\u043b\u0443 (CWE-59)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u043b\u0443\u0436\u0431\u044b Routing and Remote Access Service (RRAS) \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c Windows \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u044b\u043c \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u0438\u0435\u043c \u0441\u0438\u043c\u0432\u043e\u043b\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0441\u0441\u044b\u043b\u043e\u043a \u043f\u0435\u0440\u0435\u0434 \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c \u043a \u0444\u0430\u0439\u043b\u0443. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59510",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-59",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,6)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,5)"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…