{"id":227163,"date":"2025-12-16T01:32:37","date_gmt":"2025-12-16T07:32:37","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2025\/12\/new-windows-rasman-zero-day-flaw-gets-free-unofficial-patches"},"modified":"2025-12-16T01:32:37","modified_gmt":"2025-12-16T07:32:37","slug":"new-windows-rasman-zero-day-flaw-gets-free-unofficial-patches","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2025\/12\/new-windows-rasman-zero-day-flaw-gets-free-unofficial-patches","title":{"rendered":"New Windows RasMan zero-day flaw gets free, unofficial patches"},"content":{"rendered":"<p><\/p>\n<p><iframe style=\"display: block; margin: 0 auto; width: 100%; aspect-ratio: 4\/3; object-fit: contain;\" src=\"https:\/\/www.youtube.com\/embed\/LlOkWGi53Xw?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope;\n   picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<p>Free unofficial patches are available for a new Windows zero-day vulnerability that allows attackers to crash the Remote Access Connection Manager (RasMan) service.<\/p>\n<p>RasMan is a critical Windows system service that starts automatically, runs in the background with SYSTEM-level privileges, and manages VPN, Point-to-Point Protocol over Ethernet (PPoE), and other remote network connections.<\/p>\n<p>ACROS Security (which manages the 0patch micropatching platform) discovered a new denial-of-service (DoS) flaw while looking into <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-59230\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025\u201359230<\/a>, a Windows RasMan privilege escalation vulnerability exploited in attacks that was <a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-october-2025-patch-tuesday-fixes-6-zero-days-172-flaws\/#:~:text=CVE%2D2025%2D59230\" target=\"_blank\" rel=\"nofollow noopener\">patched in October<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Free unofficial patches are available for a new Windows zero-day vulnerability that allows attackers to crash the Remote Access Connection Manager (RasMan) service. RasMan is a critical Windows system service that starts automatically, runs in the background with SYSTEM-level privileges, and manages VPN, Point-to-Point Protocol over Ethernet (PPoE), and other remote network connections. ACROS Security [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1492],"tags":[],"class_list":["post-227163","post","type-post","status-publish","format-standard","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/227163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=227163"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/227163\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=227163"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=227163"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=227163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}