Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Windows Remote Access Connection Manager Vulnerability Enables Arbitrary Code Execution

Windows Remote Access Connection Manager Vulnerability Enables Arbitrary Code Execution

Posted on December 15, 2025December 15, 2025 By CWS

A crucial safety subject involving the Home windows Distant Entry Connection Supervisor (RasMan) that enables native attackers to execute arbitrary code with System privileges.

Whereas investigating CVE-2025-59230, the vulnerability that Microsoft addressed within the October 2025 safety updates. 0patch safety analysts found a posh exploit chain that depends on a secondary, beforehand unknown zero-day flaw to perform successfully.

The first vulnerability, CVE-2025-59230, facilities on how the RasMan service handles RPC endpoints. When the service begins, it registers a selected endpoint that different privileged companies belief.

0patch researchers discovered that if RasMan is just not operating, an attacker can register this endpoint first.

FeatureDetailsCVE IDCVE-2025-59230ComponentWindows Distant Entry Connection Supervisor (RasMan)Vulnerability TypeElevation of Privilege (EoP)ImpactLocal Arbitrary Code Execution as SystemAffected PlatformsWindows 10, Home windows 11, Home windows Server 2008-2025

As soon as the privileged companies try to attach, they unknowingly talk with the attacker’s course of, permitting for the execution of malicious instructions.

Nevertheless, exploiting this race situation is troublesome as a result of RasMan sometimes launches mechanically at system startup, leaving attackers no window of alternative to register the endpoint first.

To bypass this limitation, the found exploit makes use of a second, unpatched vulnerability. This zero-day flaw permits a non-privileged consumer to deliberately crash the RasMan service.

The crash is brought on by a logic error within the code involving a round linked record. The service makes an attempt to traverse the record however fails to correctly deal with NULL pointers, leading to a reminiscence entry violation.

By crashing the service, attackers can pressure it right into a stopped state, launch the RPC endpoint, and subsequently set off the CVE-2025-59230 exploitation chain to achieve System entry.

Microsoft has launched official patches for the elevation-of-privilege flaw (CVE-2025-59230). Nevertheless, the service crash vulnerability used to facilitate the assault remained unpatched in official channels on the time of discovery.

0patch has launched micropatches to handle this crash vector throughout supported platforms, together with Home windows 11 and Server 2025.

Directors are suggested to use the October 2025 Home windows updates instantly to mitigate the first privilege escalation danger.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Access, Arbitrary, Code, Connection, Enables, Execution, Manager, Remote, Vulnerability, Windows

Post navigation

Previous Post: CISA Adds Sierra Router Vulnerability to KEV Catalogue Following Active Exploitation
Next Post: Apple Patches Two Zero-Days Tied to Mysterious Exploited Chrome Flaw

Related Posts

GrayCharlie Targets WordPress Sites with Malicious Scripts GrayCharlie Targets WordPress Sites with Malicious Scripts Cyber Security News
ASUS Armoury Crate Vulnerability Let Attackers Escalate to System User on Windows Machine ASUS Armoury Crate Vulnerability Let Attackers Escalate to System User on Windows Machine Cyber Security News
Cybersecurity News Weekly Newsletter – 29.7 Tbps DDoS Attack, Chrome 143, React2Shell Vulnerabilities and Cloudflare Outage Cybersecurity News Weekly Newsletter – 29.7 Tbps DDoS Attack, Chrome 143, React2Shell Vulnerabilities and Cloudflare Outage Cyber Security News
Phishing Campaign Uses Maduro Arrest Story to Deliver Backdoor Payloads Phishing Campaign Uses Maduro Arrest Story to Deliver Backdoor Payloads Cyber Security News
ServiceNow AI Platform Patch Fixes Critical RCE Vulnerability ServiceNow AI Platform Patch Fixes Critical RCE Vulnerability Cyber Security News
Cybercriminals Target Winter Olympics Fans with Fake Shops Cybercriminals Target Winter Olympics Fans with Fake Shops Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark