
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability (CVE-2025-21307) is a critical vulnerability discovered in January 2025. The vulnerability affects the Windows Reliable Multicast Transport Driver, with a CVSS score of 9.8 (Critical). This vulnerability was disclosed on January 14, 2025, and affects various versions of Microsoft Windows operating systems (NVD, Microsoft Advisory).
The vulnerability allows an unauthenticated attacker to execute remote code by sending specially crafted packets to a Windows Pragmatic General Multicast (PGM) open socket on the server. Exploitation requires no user interaction but is only possible if a program is actively listening on a PGM port. The vulnerability cannot be exploited if PGM is installed or enabled but no programs are listening as receivers. Since PGM does not authenticate requests, network-level protection of open ports is crucial (CrowdStrike).
If successfully exploited, this vulnerability allows attackers to execute arbitrary code on the target system without requiring user authentication or interaction. The high CVSS score of 9.8 indicates the severe potential impact of this vulnerability, particularly concerning systems with exposed PGM receivers (CrowdStrike).
To mitigate this vulnerability, it is strongly advised to avoid exposing PGM receivers to the public internet. Organizations should implement network-level protection, such as firewalls, to protect access to any open PGM ports. Additionally, Microsoft has released security patches as part of the January 2025 Patch Tuesday updates (CrowdStrike).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”