Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Windows Remote Access Connection Manager Vulnerability Enables Arbitrary Code Execution

Windows Remote Access Connection Manager Vulnerability Enables Arbitrary Code Execution

Posted on December 15, 2025December 15, 2025 By CWS

A crucial safety subject involving the Home windows Distant Entry Connection Supervisor (RasMan) that enables native attackers to execute arbitrary code with System privileges.

Whereas investigating CVE-2025-59230, the vulnerability that Microsoft addressed within the October 2025 safety updates. 0patch safety analysts found a posh exploit chain that depends on a secondary, beforehand unknown zero-day flaw to perform successfully.

The first vulnerability, CVE-2025-59230, facilities on how the RasMan service handles RPC endpoints. When the service begins, it registers a selected endpoint that different privileged companies belief.

0patch researchers discovered that if RasMan is just not operating, an attacker can register this endpoint first.

FeatureDetailsCVE IDCVE-2025-59230ComponentWindows Distant Entry Connection Supervisor (RasMan)Vulnerability TypeElevation of Privilege (EoP)ImpactLocal Arbitrary Code Execution as SystemAffected PlatformsWindows 10, Home windows 11, Home windows Server 2008-2025

As soon as the privileged companies try to attach, they unknowingly talk with the attacker’s course of, permitting for the execution of malicious instructions.

Nevertheless, exploiting this race situation is troublesome as a result of RasMan sometimes launches mechanically at system startup, leaving attackers no window of alternative to register the endpoint first.

To bypass this limitation, the found exploit makes use of a second, unpatched vulnerability. This zero-day flaw permits a non-privileged consumer to deliberately crash the RasMan service.

The crash is brought on by a logic error within the code involving a round linked record. The service makes an attempt to traverse the record however fails to correctly deal with NULL pointers, leading to a reminiscence entry violation.

By crashing the service, attackers can pressure it right into a stopped state, launch the RPC endpoint, and subsequently set off the CVE-2025-59230 exploitation chain to achieve System entry.

Microsoft has launched official patches for the elevation-of-privilege flaw (CVE-2025-59230). Nevertheless, the service crash vulnerability used to facilitate the assault remained unpatched in official channels on the time of discovery.

0patch has launched micropatches to handle this crash vector throughout supported platforms, together with Home windows 11 and Server 2025.

Directors are suggested to use the October 2025 Home windows updates instantly to mitigate the first privilege escalation danger.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Access, Arbitrary, Code, Connection, Enables, Execution, Manager, Remote, Vulnerability, Windows

Post navigation

Previous Post: CISA Adds Sierra Router Vulnerability to KEV Catalogue Following Active Exploitation
Next Post: Apple Patches Two Zero-Days Tied to Mysterious Exploited Chrome Flaw

Related Posts

Threat Actors Fake BSODs and Trusted Build Tools to Bypass Defenses and Deploy DCRat Threat Actors Fake BSODs and Trusted Build Tools to Bypass Defenses and Deploy DCRat Cyber Security News
Threat Actors Actively Using Open-Source C2 Framework to Deliver Malicious Payloads Threat Actors Actively Using Open-Source C2 Framework to Deliver Malicious Payloads Cyber Security News
SystemBC Botnet Expands to 10,000 Devices for Global Attacks SystemBC Botnet Expands to 10,000 Devices for Global Attacks Cyber Security News
vLLM Vulnerability Enables Remote Code Execution Via Malicious Payloads vLLM Vulnerability Enables Remote Code Execution Via Malicious Payloads Cyber Security News
Chinese Hackers Weaponizes Software Vulnerabilities to Compromise Their Targets Chinese Hackers Weaponizes Software Vulnerabilities to Compromise Their Targets Cyber Security News
Ubiquiti UniFi Flaws Risk Total System Compromise Ubiquiti UniFi Flaws Risk Total System Compromise Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark