Home Microsoft CVE-2025-59502
Back to Microsoft

CVE-2025-59502

Windows - Remote Procedure Call

Microsoft CVSS 7.5 Updated March 13, 2026

Executive Risk Summary

"An uncontrolled resource consumption vulnerability in Windows Remote Procedure Call allows an unauthorized attacker to deny service over a network, potentially leading to a denial-of-service condition. This vulnerability could be exploited by an attacker to disrupt the availability of critical services on a Windows system."

Operational Audit Arsenal

Target Type DLL
Target Asset rpcrt4.dll
Standard Path %windir%\System32
PowerShell
# 🛠️ Senior Engineer Universal Audit
# Target: rpcrt4.dll (DLL)
$Targets = 'rpcrt4.dll'
$SearchPaths = @("$env:windir\System32", "$env:ProgramFiles", "${env:ProgramFiles(x86)}")

Get-ChildItem -Path $SearchPaths -Include $Targets -Recurse -ErrorAction SilentlyContinue | 
Select-Object FullName, @{Name="Version";Expression={$_.VersionInfo.ProductVersion}}

Patch Impact Forecast

Reboot Required Likely

Remote Procedure Call service affected

Internal Work Notes

Potential denial-of-service vulnerability in Windows Remote Procedure Call, requiring patching to prevent service disruption.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related Microsoft Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.