Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Windows Remote Access Connection Manager Vulnerability Enables Arbitrary Code Execution

Posted on December 15, 2025December 15, 2025 By CWS

A crucial safety subject involving the Home windows Distant Entry Connection Supervisor (RasMan) that enables native attackers to execute arbitrary code with System privileges.

Whereas investigating CVE-2025-59230, the vulnerability that Microsoft addressed within the October 2025 safety updates. 0patch safety analysts found a posh exploit chain that depends on a secondary, beforehand unknown zero-day flaw to perform successfully.

The first vulnerability, CVE-2025-59230, facilities on how the RasMan service handles RPC endpoints. When the service begins, it registers a selected endpoint that different privileged companies belief.

0patch researchers discovered that if RasMan is just not operating, an attacker can register this endpoint first.

FeatureDetailsCVE IDCVE-2025-59230ComponentWindows Distant Entry Connection Supervisor (RasMan)Vulnerability TypeElevation of Privilege (EoP)ImpactLocal Arbitrary Code Execution as SystemAffected PlatformsWindows 10, Home windows 11, Home windows Server 2008-2025

As soon as the privileged companies try to attach, they unknowingly talk with the attacker’s course of, permitting for the execution of malicious instructions.

Nevertheless, exploiting this race situation is troublesome as a result of RasMan sometimes launches mechanically at system startup, leaving attackers no window of alternative to register the endpoint first.

To bypass this limitation, the found exploit makes use of a second, unpatched vulnerability. This zero-day flaw permits a non-privileged consumer to deliberately crash the RasMan service.

The crash is brought on by a logic error within the code involving a round linked record. The service makes an attempt to traverse the record however fails to correctly deal with NULL pointers, leading to a reminiscence entry violation.

By crashing the service, attackers can pressure it right into a stopped state, launch the RPC endpoint, and subsequently set off the CVE-2025-59230 exploitation chain to achieve System entry.

Microsoft has launched official patches for the elevation-of-privilege flaw (CVE-2025-59230). Nevertheless, the service crash vulnerability used to facilitate the assault remained unpatched in official channels on the time of discovery.

0patch has launched micropatches to handle this crash vector throughout supported platforms, together with Home windows 11 and Server 2025.

Directors are suggested to use the October 2025 Home windows updates instantly to mitigate the first privilege escalation danger.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Access, Arbitrary, Code, Connection, Enables, Execution, Manager, Remote, Vulnerability, Windows

Post navigation

Previous Post: CISA Adds Sierra Router Vulnerability to KEV Catalogue Following Active Exploitation
Next Post: Apple Patches Two Zero-Days Tied to Mysterious Exploited Chrome Flaw

Related Posts

DSPM vs. DLP : Understanding the Key Differences Cyber Security News
KFC Venezuela Alleged Data Breach Cyber Security News
81% Router Usres Have Not Changed Default Admin Passwords, Exposing Devices to Hackers Cyber Security News
HashiCorp Vault Vulnerabilities Let Attack Bypass Authentication And Trigger DoS Attack Cyber Security News
New Cyberattack Leverages NPM Ecosystem to Infect Developers While Installing Packages Cyber Security News
Wireshark 4.4.9 Released With Fix For Critical Bugs and Updated Protocol Support Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical FortiGate Devices SSO Vulnerabilities Actively Exploited in the Wild
  • PornHub Breached by ShinyHunters Group and Premium Members Data Stolen
  • Google to Shut Down Dark Web Monitoring Tool in February 2026
  • ZnDoor Malware Exploiting React2Shell Vulnerability to Compromise Network Devices
  • Featured Chrome Browser Extension Caught Intercepting Millions of Users’ AI Chats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical FortiGate Devices SSO Vulnerabilities Actively Exploited in the Wild
  • PornHub Breached by ShinyHunters Group and Premium Members Data Stolen
  • Google to Shut Down Dark Web Monitoring Tool in February 2026
  • ZnDoor Malware Exploiting React2Shell Vulnerability to Compromise Network Devices
  • Featured Chrome Browser Extension Caught Intercepting Millions of Users’ AI Chats

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark