CVE-2025-21307
vulnerability analysis and mitigation

Overview

Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability (CVE-2025-21307) is a critical vulnerability discovered in January 2025. The vulnerability affects the Windows Reliable Multicast Transport Driver, with a CVSS score of 9.8 (Critical). This vulnerability was disclosed on January 14, 2025, and affects various versions of Microsoft Windows operating systems (NVD, Microsoft Advisory).

Technical details

The vulnerability allows an unauthenticated attacker to execute remote code by sending specially crafted packets to a Windows Pragmatic General Multicast (PGM) open socket on the server. Exploitation requires no user interaction but is only possible if a program is actively listening on a PGM port. The vulnerability cannot be exploited if PGM is installed or enabled but no programs are listening as receivers. Since PGM does not authenticate requests, network-level protection of open ports is crucial (CrowdStrike).

Impact

If successfully exploited, this vulnerability allows attackers to execute arbitrary code on the target system without requiring user authentication or interaction. The high CVSS score of 9.8 indicates the severe potential impact of this vulnerability, particularly concerning systems with exposed PGM receivers (CrowdStrike).

Mitigation and workarounds

To mitigate this vulnerability, it is strongly advised to avoid exposing PGM receivers to the public internet. Organizations should implement network-level protection, such as firewalls, to protect access to any open PGM ports. Additionally, Microsoft has released security patches as part of the January 2025 Patch Tuesday updates (CrowdStrike).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management