MSRC compact vulnerability detail

CVE-2025-21307 · Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability

No description was published by MSRC.

Severity
Critical
Impact
Remote Code Execution
CVSS
9.8 base · 8.5 temporal
Release
2025-01-14
Signals
Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Exploited: No Publicly disclosed: No Exploitability: Exploitation Less Likely
CWE
Patch Diff
Loading module diff metadata...
Resolved binary override
Use this when the MSRC module name cannot be mapped automatically or the resolved binary looks wrong.
Old version New version
Description
No description was published by MSRC.
FAQ / Articles
Mitigation
The following mitigating factors might be helpful in your situation: This vulnerability is only exploitable only if there is a program listening on a Pragmatic General Multicast (PGM) port. If PGM is installed or enabled but no programs are actively listening as a receiver, then this vulnerability is not exploitable. PGM does not authenticate requests so it is recommended to protect access to any open ports at the network level (e.g. with a firewall). It is not recommended to expose a PGM receiver to the public internet.
FAQ
How could an attacker exploit this vulnerability? An unauthenticated attacker could exploit the vulnerability by sending specially crafted packets to a Windows Pragmatic General Multicast (PGM) open socket on the server, without any interaction from the user.