PT-2025-42115 · Microsoft · Rasman +1
Published
2025-10-14
·
Updated
2026-01-15
·
CVE-2025-59230
CVSS v3.1
7.8
7.8
High
| Base vector | Vector | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Microsoft Windows versions prior to KB5065813
Description
An improper access control issue exists in the Windows Remote Access Connection Manager (RasMan). This allows a local attacker to elevate privileges, potentially gaining SYSTEM-level access. The vulnerability involves flaws in access control and is linked to CVE-2025-59230, which was initially patched in October 2025. However, a secondary, previously unknown zero-day flaw remains unpatched, enabling exploitation through a chain of vulnerabilities. Active exploitation of this vulnerability has been confirmed, with attackers leveraging it to gain full control over affected systems. The vulnerability impacts systems running RasMan, a critical Windows service responsible for managing VPN and other remote network connections. A denial-of-service flaw has also been discovered, allowing unprivileged users to crash the RasMan service, which can be used as a stepping stone for privilege escalation. The issue has been observed to affect the functionality of the Azure VPN Client after the installation of update KB5065813.
Recommendations
Update to Windows versions with KB5065813 or later.
As a temporary workaround, consider disabling the RasMan service until a permanent fix is available.
If possible, restrict access to the RasMan service to minimize the risk of exploitation.
Fix
DoS
LPE
Improper Access Control
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-12964
CVE-2025-59230
Affected Products
Windows
Rasman
References · 85
- https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59230 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-59230 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/725769 · Security Note
- https://bdu.fstec.ru/vul/2025-12964 · Security Note
- https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-59230 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59230 · Security Note
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59230 · Vendor Advisory
- https://reddit.com/r/ImpMSNews/comments/1o73mva/last_patch_for_windows_10_with_kb5066791_and_5 · Reddit Post
- https://twitter.com/CveTodo/status/1978151856489504862 · Twitter Post
- https://twitter.com/Action1corp/status/1978153782891696533 · Twitter Post
- https://reddit.com/r/SecOpsDaily/comments/1o88ipf/cve202559230_and_cve202524990_vulnerabilities_new · Reddit Post
- https://t.me/cveNotify/144605 · Telegram Post
- https://twitter.com/cyber_sec_raj/status/1979390258509943176 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1potrly/top_10_trending_cves_17122025 · Reddit Post
- https://t.me/avleonovcom/1604 · Telegram Post