Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Windows Remote Access Connection Manager Vulnerability Enables Arbitrary Code Execution

Posted on December 15, 2025December 15, 2025 By CWS

A crucial safety subject involving the Home windows Distant Entry Connection Supervisor (RasMan) that enables native attackers to execute arbitrary code with System privileges.

Whereas investigating CVE-2025-59230, the vulnerability that Microsoft addressed within the October 2025 safety updates. 0patch safety analysts found a posh exploit chain that depends on a secondary, beforehand unknown zero-day flaw to perform successfully.

The first vulnerability, CVE-2025-59230, facilities on how the RasMan service handles RPC endpoints. When the service begins, it registers a selected endpoint that different privileged companies belief.

0patch researchers discovered that if RasMan is just not operating, an attacker can register this endpoint first.

FeatureDetailsCVE IDCVE-2025-59230ComponentWindows Distant Entry Connection Supervisor (RasMan)Vulnerability TypeElevation of Privilege (EoP)ImpactLocal Arbitrary Code Execution as SystemAffected PlatformsWindows 10, Home windows 11, Home windows Server 2008-2025

As soon as the privileged companies try to attach, they unknowingly talk with the attacker’s course of, permitting for the execution of malicious instructions.

Nevertheless, exploiting this race situation is troublesome as a result of RasMan sometimes launches mechanically at system startup, leaving attackers no window of alternative to register the endpoint first.

To bypass this limitation, the found exploit makes use of a second, unpatched vulnerability. This zero-day flaw permits a non-privileged consumer to deliberately crash the RasMan service.

The crash is brought on by a logic error within the code involving a round linked record. The service makes an attempt to traverse the record however fails to correctly deal with NULL pointers, leading to a reminiscence entry violation.

By crashing the service, attackers can pressure it right into a stopped state, launch the RPC endpoint, and subsequently set off the CVE-2025-59230 exploitation chain to achieve System entry.

Microsoft has launched official patches for the elevation-of-privilege flaw (CVE-2025-59230). Nevertheless, the service crash vulnerability used to facilitate the assault remained unpatched in official channels on the time of discovery.

0patch has launched micropatches to handle this crash vector throughout supported platforms, together with Home windows 11 and Server 2025.

Directors are suggested to use the October 2025 Home windows updates instantly to mitigate the first privilege escalation danger.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Access, Arbitrary, Code, Connection, Enables, Execution, Manager, Remote, Vulnerability, Windows

Post navigation

Previous Post: CISA Adds Sierra Router Vulnerability to KEV Catalogue Following Active Exploitation
Next Post: Apple Patches Two Zero-Days Tied to Mysterious Exploited Chrome Flaw

Related Posts

Zscaler Confirms Data Breach – Hackers Compromised Salesforce Instance and Stole Customer Data Cyber Security News
AI-Powered Code Editor Cursor IDE Vulnerability Enables Remote Code Without User Interaction Cyber Security News
5 Deception Solutions that are Changing the Cybersecurity Game  Cyber Security News
Threat Actors Advertising Anivia Stealer Malware on Dark Web Bypassing UAC Controls Cyber Security News
Hackers Compromised Official Gaming Mouse Software to Deliver Windows-based Xred Malware Cyber Security News
CyberVolk Ransomware Attacking Windows System in Critical Infrastructure and Scientific Institutions Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ZnDoor Malware Exploiting React2Shell Vulnerability to Compromise Network Devices
  • Featured Chrome Browser Extension Caught Intercepting Millions of Users’ AI Chats
  • New PCPcat Exploiting React2Shell Vulnerability to compromise 59,000+ Servers
  • Militant Groups Are Experimenting With AI, and the Risks Are Expected to Grow
  • xHunt APT Hackers Attacking Microsoft Exchange and IIS Web Servers to Deploy Custom Backdoors

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ZnDoor Malware Exploiting React2Shell Vulnerability to Compromise Network Devices
  • Featured Chrome Browser Extension Caught Intercepting Millions of Users’ AI Chats
  • New PCPcat Exploiting React2Shell Vulnerability to compromise 59,000+ Servers
  • Militant Groups Are Experimenting With AI, and the Risks Are Expected to Grow
  • xHunt APT Hackers Attacking Microsoft Exchange and IIS Web Servers to Deploy Custom Backdoors

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark