Close Menu
  • Home
  • AI
  • Big Data
  • Cloud Computing
  • iOS Development
  • IoT
  • IT/ Cybersecurity
  • Tech
    • Nanotechnology
    • Green Technology
    • Apple
    • Software Development
    • Software Engineering

Subscribe to Updates

Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

    What's Hot

    Cisco and Indeed Global Partnership Debuts Career Hub for India

    February 15, 2026

    Anker’s Weekend Sale Includes Big Savings on Newest Prime Chargers

    February 15, 2026

    When Does Technology Migration Make Sense? Business ROI Strategy & Real Examples

    February 15, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Big Tee Tech Hub
    • Home
    • AI
    • Big Data
    • Cloud Computing
    • iOS Development
    • IoT
    • IT/ Cybersecurity
    • Tech
      • Nanotechnology
      • Green Technology
      • Apple
      • Software Development
      • Software Engineering
    Big Tee Tech Hub
    Home»IT/ Cybersecurity»Microsoft Patches Windows Flaw Causing VPN Disruptions
    IT/ Cybersecurity

    Microsoft Patches Windows Flaw Causing VPN Disruptions

    big tee tech hubBy big tee tech hubFebruary 15, 2026013 Mins Read
    Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email Telegram WhatsApp
    Follow Us
    Google News Flipboard
    Microsoft Patches Windows Flaw Causing VPN Disruptions
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    A system update being done on a laptop.
    Image: AndersonPiza/Envato

    Microsoft has patched a vulnerability in the Windows Remote Access Connection Manager (RasMan) service that was being exploited to trigger denial-of-service (DoS) conditions on unpatched systems.

    If exploited, the flaw can cause the remote access service to crash, potentially interrupting VPN connectivity and affecting remote access for users and administrators.

    The vulnerability “… allows an unauthorized attacker to deny service locally,” Microsoft said in its advisory.

    1
    Semperis

    Employees per Company Size

    Micro (0-49), Small (50-249), Medium (250-999), Large (1,000-4,999), Enterprise (5,000+)

    Small (50-249 Employees), Medium (250-999 Employees), Large (1,000-4,999 Employees), Enterprise (5,000+ Employees)
    Small, Medium, Large, Enterprise

    Features

    Advanced Attacks Detection, Advanced Automation, Anywhere Recovery, and more

    2
    Ready1

    Employees per Company Size

    Micro (0-49), Small (50-249), Medium (250-999), Large (1,000-4,999), Enterprise (5,000+)

    Small (50-249 Employees), Medium (250-999 Employees), Large (1,000-4,999 Employees), Enterprise (5,000+ Employees)
    Small, Medium, Large, Enterprise

    Features

    Incident Management

    How the RasMan vulnerability works

    RasMan is a core Windows service that manages remote access connections, including VPN and legacy dial-up services. It plays a central role in enabling secure connectivity for remote employees, administrators, and systems that rely on tunneled network access.

    Because many organizations depend on VPN infrastructure to support hybrid work and distributed IT operations, disruptions to RasMan can have immediate operational consequences.

    CVE-2026-21525 stems from a NULL pointer dereference vulnerability within the RasMan service.

    The issue is caused by improper input validation during the connection negotiation process, specifically involving rascustom.dll or related modules. When RasMan processes specially crafted or malformed data, it may attempt to dereference an uninitialized (NULL) pointer, causing the service to crash.

    Exploitation does not require elevated privileges or user interaction.

    An attacker with basic local access to a vulnerable system can send crafted input or malformed packets to repeatedly trigger the vulnerable code path, which results in a DoS condition. In some cases, the RasMan service does not automatically restart after a crash, which can prolong connectivity outages until manual intervention.

    Microsoft has confirmed the vulnerability is being actively exploited in the wild.

    Reducing exposure to RasMan service crashes

    Organizations should address this vulnerability using a layered approach that goes beyond patch deployment to include monitoring and system hardening.

    • Patch affected systems and verify patch coverage through vulnerability scanning and build validation.
    • Enable automatic updates and confirm operating systems remain within Microsoft’s support lifecycle to ensure continued access to security fixes.
    • Monitor for repeated RasMan service crashes, unexpected restarts, and abnormal VPN negotiation activity, and configure service recovery options to automatically restart and alert on failures.
    • Review EDR and Windows event logs for suspicious local activity, including processes interacting with RasMan components such as rasman.exe or rascustom.dll.
    • Reduce local attack surface by enforcing least privilege, limiting interactive logon rights, removing unnecessary local admin accounts, and restricting RasMan to systems that require remote access.
    • Implement application control policies, such as AppLocker or Microsoft Defender Application Control, to prevent unauthorized scripts or binaries from executing.
    • Test incident response plans to ensure teams can quickly detect, contain, and recover from availability-focused attacks.

    Collectively, these measures help reduce overall exposure and limit the potential blast radius if the vulnerability is exploited. Although not an RCE or privilege escalation flaw, CVE-2026-21525 underscores how availability vulnerabilities in core infrastructure components can create operational risk when actively exploited.

    For enterprises that depend on VPN-based access, sustained disruption to RasMan can affect administrative workflows, remote productivity, and service reliability.

    Editor’s note: This article originally appeared on our sister website, eSecurityPlanet.



    Source link

    Causing Disruptions Flaw Microsoft patches VPN Windows
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    tonirufai
    big tee tech hub
    • Website

    Related Posts

    The Top 12 Scams Of Christmas To Watch Out For

    February 14, 2026

    How Cisco’s partnerships with LISC, Per Scholas are building resilience in Western North Carolina

    February 13, 2026

    Polish hacker charged seven years after massive Morele.net data breach

    February 13, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    Cisco and Indeed Global Partnership Debuts Career Hub for India

    February 15, 2026

    Anker’s Weekend Sale Includes Big Savings on Newest Prime Chargers

    February 15, 2026

    When Does Technology Migration Make Sense? Business ROI Strategy & Real Examples

    February 15, 2026

    Microsoft Patches Windows Flaw Causing VPN Disruptions

    February 15, 2026
    About Us
    About Us

    Welcome To big tee tech hub. Big tee tech hub is a Professional seo tools Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of seo tools, with a focus on dependability and tools. We’re working to turn our passion for seo tools into a booming online website. We hope you enjoy our seo tools as much as we enjoy offering them to you.

    Don't Miss!

    Cisco and Indeed Global Partnership Debuts Career Hub for India

    February 15, 2026

    Anker’s Weekend Sale Includes Big Savings on Newest Prime Chargers

    February 15, 2026

    Subscribe to Updates

    Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

      • About Us
      • Contact Us
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
      © 2026 bigteetechhub.All Right Reserved

      Type above and press Enter to search. Press Esc to cancel.