CVE-2025-21174: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows Server 2019
Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.
AI Analysis
Technical Summary
CVE-2025-21174 is a high-severity vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting Microsoft Windows Server 2019, specifically version 10.0.17763.0. The vulnerability resides in the Windows Standards-Based Storage Management Service, which is responsible for managing storage resources on the server. An unauthorized attacker can exploit this flaw remotely over the network without requiring any authentication or user interaction. The exploitation involves sending crafted requests that cause the service to consume excessive system resources, such as CPU, memory, or storage I/O, leading to a denial of service (DoS) condition. This results in the affected server becoming unresponsive or crashing, thereby disrupting normal operations. The CVSS v3.1 base score is 7.5, reflecting a high impact on availability (A:H) with no impact on confidentiality or integrity. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope remains unchanged (S:U), meaning the impact is confined to the vulnerable component. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that mitigation may rely on vendor updates once available. This vulnerability highlights the risk of resource exhaustion attacks on critical server infrastructure components, which can severely affect service availability and business continuity.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the availability of critical IT infrastructure running Windows Server 2019. Many enterprises, government agencies, and service providers in Europe rely on Windows Server environments for file storage, application hosting, and enterprise services. A successful exploitation could lead to denial of service, causing downtime, disruption of business operations, and potential financial losses. Sectors such as finance, healthcare, manufacturing, and public administration, which often depend on high availability and data integrity, could be particularly impacted. Additionally, the lack of required authentication and user interaction lowers the barrier for attackers, increasing the likelihood of exploitation attempts. The disruption could also affect compliance with European regulations like GDPR if service outages impact data availability or processing. Although no known exploits exist yet, the vulnerability's characteristics make it a plausible target for attackers aiming to cause service outages or leverage it as part of a larger attack chain.
Mitigation Recommendations
European organizations should proactively monitor for security advisories from Microsoft regarding patches or workarounds for CVE-2025-21174 and apply updates promptly once available. Until patches are released, network-level mitigations can be employed, such as restricting access to the Windows Standards-Based Storage Management Service ports to trusted hosts only via firewall rules or network segmentation. Implementing rate limiting or intrusion prevention system (IPS) rules to detect and block anomalous traffic patterns targeting the storage management service can reduce the risk of resource exhaustion. Organizations should also conduct regular resource monitoring on Windows Server 2019 systems to detect unusual spikes in CPU, memory, or I/O usage that could indicate exploitation attempts. Employing robust logging and alerting mechanisms will aid in early detection. Additionally, reviewing and minimizing the exposure of Windows Server management services to the internet or untrusted networks will reduce attack surface. Finally, maintaining an up-to-date asset inventory and vulnerability management program will ensure timely identification and remediation of affected systems.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Ireland
CVE-2025-21174: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows Server 2019
Description
Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.
AI-Powered Analysis
Technical Analysis
CVE-2025-21174 is a high-severity vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting Microsoft Windows Server 2019, specifically version 10.0.17763.0. The vulnerability resides in the Windows Standards-Based Storage Management Service, which is responsible for managing storage resources on the server. An unauthorized attacker can exploit this flaw remotely over the network without requiring any authentication or user interaction. The exploitation involves sending crafted requests that cause the service to consume excessive system resources, such as CPU, memory, or storage I/O, leading to a denial of service (DoS) condition. This results in the affected server becoming unresponsive or crashing, thereby disrupting normal operations. The CVSS v3.1 base score is 7.5, reflecting a high impact on availability (A:H) with no impact on confidentiality or integrity. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope remains unchanged (S:U), meaning the impact is confined to the vulnerable component. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that mitigation may rely on vendor updates once available. This vulnerability highlights the risk of resource exhaustion attacks on critical server infrastructure components, which can severely affect service availability and business continuity.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the availability of critical IT infrastructure running Windows Server 2019. Many enterprises, government agencies, and service providers in Europe rely on Windows Server environments for file storage, application hosting, and enterprise services. A successful exploitation could lead to denial of service, causing downtime, disruption of business operations, and potential financial losses. Sectors such as finance, healthcare, manufacturing, and public administration, which often depend on high availability and data integrity, could be particularly impacted. Additionally, the lack of required authentication and user interaction lowers the barrier for attackers, increasing the likelihood of exploitation attempts. The disruption could also affect compliance with European regulations like GDPR if service outages impact data availability or processing. Although no known exploits exist yet, the vulnerability's characteristics make it a plausible target for attackers aiming to cause service outages or leverage it as part of a larger attack chain.
Mitigation Recommendations
European organizations should proactively monitor for security advisories from Microsoft regarding patches or workarounds for CVE-2025-21174 and apply updates promptly once available. Until patches are released, network-level mitigations can be employed, such as restricting access to the Windows Standards-Based Storage Management Service ports to trusted hosts only via firewall rules or network segmentation. Implementing rate limiting or intrusion prevention system (IPS) rules to detect and block anomalous traffic patterns targeting the storage management service can reduce the risk of resource exhaustion. Organizations should also conduct regular resource monitoring on Windows Server 2019 systems to detect unusual spikes in CPU, memory, or I/O usage that could indicate exploitation attempts. Employing robust logging and alerting mechanisms will aid in early detection. Additionally, reviewing and minimizing the exposure of Windows Server management services to the internet or untrusted networks will reduce attack surface. Finally, maintaining an up-to-date asset inventory and vulnerability management program will ensure timely identification and remediation of affected systems.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2024-12-05T21:43:30.760Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aebadd
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 7/11/2025, 3:05:02 AM
Last updated: 7/28/2025, 9:09:44 AM
Views: 11
Related Threats
CVE-2025-8954: SQL Injection in PHPGurukul Hospital Management System
MediumCVE-2025-8953: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-54472: CWE-400 Uncontrolled Resource Consumption in Apache Software Foundation Apache bRPC
UnknownCVE-2025-48862: CWE-1104 Use of Unmaintained Third Party Components in Bosch Rexroth AG ctrlX OS - Setup
HighCVE-2025-48861: CWE-284 Improper Access Control in Bosch Rexroth AG ctrlX OS - Setup
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.