Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Hackers Compromise @antv npm Packages via Mini Shai-Hulud
May 19, 2026
CISA Exposes AWS GovCloud Credentials on Public Admin GitHub
May 19, 2026
Hackers Abuse Entra ID to Exfiltrate Microsoft Accounts Azure
May 19, 2026
Home/CyberSecurity News/Windows Remote Access Connection Manager 0-Day Vulnerability Let
CyberSecurity News

Windows Remote Access Connection Manager 0-Day Vulnerability Let

Microsoft has patched a zero-day vulnerability, identified as CVE-2026-21525, affecting the Windows Remote Access Connection Manager (RasMan) service. This flaw enabled attackers to trigger...

David kimber
David kimber
February 11, 2026 2 Min Read
5 0

Microsoft has patched a zero-day vulnerability, identified as CVE-2026-21525, affecting the Windows Remote Access Connection Manager (RasMan) service. This flaw enabled attackers to trigger denial-of-service (DoS) conditions on unpatched systems.

The flaw, stemming from a NULL pointer dereference (CWE-476), was actively exploited in the wild before disclosure, earning an “Exploitation Detected” rating from Microsoft’s MSRC exploitability index.

RasMan, a core Windows component handling remote access connections like VPNs and dial-up, crashes when processing malformed data due to improper NULL pointer validation.

An unauthorized local attacker requires only local access, no elevated privileges or user interaction, to send crafted input, causing the service to dereference a NULL pointer and halt.

This leads to high availability impact, with the service failing to restart automatically in some cases, disrupting remote connectivity for users and servers.

Attackers exploit RasMan by triggering a vulnerable code path in rascustom.dll or related modules during connection negotiation. A simple local script or binary can flood the service with invalid packets, dereferencing uninitialized pointers. Proof-of-concept code remains unproven publicly (E:U), but 0patch researchers confirmed real-world exploitation.

The February 2026 Patch Tuesday (released February 10) addresses the issue across:

  • Windows 11 26H1 (x64/ARM64): KB5077179, build 10.0.28000.1575
  • Windows Server 2012 R2 (Core/Full): KB5075970, build 6.3.9600.23022
  • Windows Server 2012 (Core): KB5075971, build 6.2.9200.25923

Microsoft mandates immediate patching, available via Windows Update or the Microsoft Update Catalog. Check support lifecycles for older OSes.

The 0patch vulnerability research team, in collaboration with 0patch by ACROS Security (0patch.com), discovered and reported the flaw through coordinated disclosure. Microsoft credits them in its acknowledgements.

Organizations should prioritize RasMan-exposed endpoints, enable automatic updates, and monitor for unusual service crashes. While local-only, insider threats or initial footholds (e.g., via phishing) heighten exposure. No workarounds exist beyond disabling RasMan, which breaks remote access.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchphishingSecurityThreatVulnerabilityzero-day

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Windows Shell 0-Day Flaw Bypasses Security Feature

Next Post

Sophisticated Cyber Attack Targets Wedding Industry via Teams Malware

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical n8n Flaws Expose Automation Nodes to Vulnerabilities Full
May 18, 2026
Linus Torvalds Says AI Bug Reports Have Made Linux Security
May 18, 2026
Malicious npm Packages Steal SSH, Cloud & Crypto Four Keys
May 18, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us