Patch
CVE-2025-21307
with vRx
❗ CVE-2025-21307 is a critical remote code execution (RCE) vulnerability in the Windows Reliable Multicast Transport Driver (RMCAST), which supports the Pragmatic General Multicast (PGM) protocol. This flaw allows unauthenticated attackers to send specially crafted packets to systems with an open PGM socket, enabling them to execute arbitrary code on affected systems. Systems with the Microsoft Message Queuing (MSMQ) service enabled are particularly at risk. Exploitation requires no prior authentication or user interaction, potentially resulting in data breaches, unauthorized system control, and further network compromise.
ℹ️ This mitigation script disables the MSMQ service to protect the system from exploitation:
Check MSMQ Feature Status:
Uses Get-WindowsOptionalFeature to verify if the MSMQ feature is installed and enabled.
If the feature is not installed, the script confirms no action is required.
Stop and Disable MSMQ Service:
Uses Stop-Service to halt the MSMQ service if it is running.
Uses Set-Service to set the MSMQ service startup type to Disabled, preventing it from starting automatically.
Confirm Mitigation:
Outputs a success message if the MSMQ service is stopped and disabled.
Provides error details if the mitigation fails.
✅ Running this mitigation script ensures that the MSMQ service is disabled, reducing the risk of exploitation by CVE-2025-21307.
Read more
Read less
Patch faster and smarter
with vRx
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Trusted by 600+ customers:




Solution
Remediate faster with vRx
Patch Management
vRx automatically deploys patches across all systems, cutting patching time by 80%.
Scripting Engine
vRx’s scripting engine solves complex vulnerabilities, like log4j, with built-in or custom scripts.
Patchless Protection
vRx’s Patchless Protection secures vulnerable apps and reduces risk while maintaining functionality.

Automated Patching, Scripting, and more
Talk with our team to get a personal walkthrough
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.