Skip to main content

CVE-2025-21174: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows Server 2019

High
VulnerabilityCVE-2025-21174cvecve-2025-21174cwe-400
Published: Tue Apr 08 2025 (04/08/2025, 17:23:35 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows Server 2019

Description

Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.

AI-Powered Analysis

AILast updated: 07/11/2025, 03:05:02 UTC

Technical Analysis

CVE-2025-21174 is a high-severity vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting Microsoft Windows Server 2019, specifically version 10.0.17763.0. The vulnerability resides in the Windows Standards-Based Storage Management Service, which is responsible for managing storage resources on the server. An unauthorized attacker can exploit this flaw remotely over the network without requiring any authentication or user interaction. The exploitation involves sending crafted requests that cause the service to consume excessive system resources, such as CPU, memory, or storage I/O, leading to a denial of service (DoS) condition. This results in the affected server becoming unresponsive or crashing, thereby disrupting normal operations. The CVSS v3.1 base score is 7.5, reflecting a high impact on availability (A:H) with no impact on confidentiality or integrity. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope remains unchanged (S:U), meaning the impact is confined to the vulnerable component. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that mitigation may rely on vendor updates once available. This vulnerability highlights the risk of resource exhaustion attacks on critical server infrastructure components, which can severely affect service availability and business continuity.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the availability of critical IT infrastructure running Windows Server 2019. Many enterprises, government agencies, and service providers in Europe rely on Windows Server environments for file storage, application hosting, and enterprise services. A successful exploitation could lead to denial of service, causing downtime, disruption of business operations, and potential financial losses. Sectors such as finance, healthcare, manufacturing, and public administration, which often depend on high availability and data integrity, could be particularly impacted. Additionally, the lack of required authentication and user interaction lowers the barrier for attackers, increasing the likelihood of exploitation attempts. The disruption could also affect compliance with European regulations like GDPR if service outages impact data availability or processing. Although no known exploits exist yet, the vulnerability's characteristics make it a plausible target for attackers aiming to cause service outages or leverage it as part of a larger attack chain.

Mitigation Recommendations

European organizations should proactively monitor for security advisories from Microsoft regarding patches or workarounds for CVE-2025-21174 and apply updates promptly once available. Until patches are released, network-level mitigations can be employed, such as restricting access to the Windows Standards-Based Storage Management Service ports to trusted hosts only via firewall rules or network segmentation. Implementing rate limiting or intrusion prevention system (IPS) rules to detect and block anomalous traffic patterns targeting the storage management service can reduce the risk of resource exhaustion. Organizations should also conduct regular resource monitoring on Windows Server 2019 systems to detect unusual spikes in CPU, memory, or I/O usage that could indicate exploitation attempts. Employing robust logging and alerting mechanisms will aid in early detection. Additionally, reviewing and minimizing the exposure of Windows Server management services to the internet or untrusted networks will reduce attack surface. Finally, maintaining an up-to-date asset inventory and vulnerability management program will ensure timely identification and remediation of affected systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-05T21:43:30.760Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebadd

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/11/2025, 3:05:02 AM

Last updated: 7/28/2025, 9:09:44 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats