Skip to main content

CVE-2025-24045: CWE-591: Sensitive Data Storage in Improperly Locked Memory in Microsoft Windows Server 2019

High
VulnerabilityCVE-2025-24045cvecve-2025-24045cwe-591
Published: Tue Mar 11 2025 (03/11/2025, 16:59:07 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows Server 2019

Description

Sensitive data storage in improperly locked memory in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network.

AI-Powered Analysis

AILast updated: 07/11/2025, 14:32:46 UTC

Technical Analysis

CVE-2025-24045 is a high-severity vulnerability identified in Microsoft Windows Server 2019, specifically version 10.0.17763.0, affecting the Windows Remote Desktop Services (RDS) component. The vulnerability is categorized under CWE-591, which pertains to sensitive data storage in improperly locked memory. This flaw allows sensitive data to be stored in memory regions that are not adequately protected or locked, potentially enabling unauthorized access. Exploitation of this vulnerability can lead to remote code execution (RCE) over the network without requiring any authentication or user interaction. The CVSS 3.1 base score of 8.1 reflects the critical nature of this vulnerability, with attack vector being network-based (AV:N), requiring high attack complexity (AC:H), no privileges required (PR:N), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), indicating that successful exploitation could lead to full system compromise, data leakage, and service disruption. The vulnerability was publicly disclosed on March 11, 2025, and while no known exploits are currently reported in the wild, the presence of a remote code execution vector without authentication makes it a significant threat. The lack of available patches at the time of disclosure further elevates the risk, necessitating immediate attention from system administrators and security teams. The root cause lies in the improper handling of sensitive data in memory by the RDS service, which could be leveraged by attackers to execute arbitrary code remotely, potentially gaining control over affected servers.

Potential Impact

For European organizations, this vulnerability poses a substantial risk due to the widespread use of Windows Server 2019 in enterprise environments, including critical infrastructure, financial institutions, healthcare, and government agencies. Exploitation could lead to unauthorized access to sensitive data, disruption of essential services, and potential lateral movement within networks. Given the high confidentiality, integrity, and availability impact, organizations could face data breaches, operational downtime, and compliance violations under regulations such as GDPR. The remote code execution capability without authentication increases the likelihood of automated attacks or wormable exploits, which could rapidly propagate across vulnerable systems. This threat is particularly concerning for sectors relying heavily on remote desktop services for administrative access and remote work, which remains prevalent in Europe. Additionally, the absence of known exploits currently provides a window for proactive mitigation, but also means attackers may be actively developing exploit code, increasing urgency for patching and protective measures.

Mitigation Recommendations

1. Immediate deployment of any available security updates or patches from Microsoft once released is critical. Monitor official Microsoft security advisories and update management systems accordingly. 2. Until patches are available, restrict network access to Remote Desktop Services using network-level controls such as firewalls, VPNs, or IP whitelisting to limit exposure to trusted hosts only. 3. Implement Network Level Authentication (NLA) for RDS to add an additional authentication layer, reducing the attack surface. 4. Employ intrusion detection and prevention systems (IDS/IPS) with updated signatures to detect potential exploitation attempts targeting this vulnerability. 5. Conduct thorough auditing and monitoring of RDS logs and network traffic for unusual activities indicative of exploitation attempts. 6. Consider disabling RDS if not essential, or isolate RDS servers in segmented network zones with strict access controls. 7. Educate IT staff on the risks associated with this vulnerability and ensure incident response plans are updated to handle potential exploitation scenarios. 8. Use endpoint protection solutions capable of behavioral analysis to detect and block suspicious activities related to memory exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-01-16T23:11:19.731Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb302

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/11/2025, 2:32:46 PM

Last updated: 8/18/2025, 11:29:11 PM

Views: 29

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats