Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24045: CWE-591: Sensitive Data Storage in Improperly Locked Memory in Microsoft Windows Server 2012

0
High
VulnerabilityCVE-2025-24045cvecve-2025-24045cwe-591
Published: Tue Mar 11 2025 (03/11/2025, 16:59:07 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows Server 2012

Description

Sensitive data storage in improperly locked memory in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 08:53:33 UTC

Technical Analysis

CVE-2025-24045 is a vulnerability identified in Microsoft Windows Server 2012, specifically affecting the Remote Desktop Services (RDS) component. The root cause is the improper locking of memory regions where sensitive data is stored, classified under CWE-591 (Sensitive Data Storage in Improperly Locked Memory). This improper memory handling can allow an unauthorized attacker to remotely execute arbitrary code over the network without requiring authentication or user interaction. The vulnerability is significant because Remote Desktop Services are commonly exposed in enterprise environments for remote management and user access. The CVSS v3.1 base score of 8.1 reflects high severity, with attack vector being network-based (AV:N), requiring high attack complexity (AC:H), no privileges required (PR:N), and no user interaction (UI:N). The impact affects confidentiality, integrity, and availability (all high). Although no exploits are currently known in the wild, the vulnerability's nature suggests that attackers could leverage leaked sensitive data from memory to bypass security controls and execute malicious payloads remotely. The affected version is Windows Server 2012 build 6.2.9200.0, a widely deployed server OS in many organizations. The lack of available patches at the time of publication necessitates immediate risk mitigation through network-level controls and monitoring.

Potential Impact

For European organizations, the impact of CVE-2025-24045 is substantial. Many enterprises and public sector entities continue to operate legacy Windows Server 2012 systems, particularly in critical infrastructure, healthcare, finance, and government sectors. Exploitation could lead to unauthorized remote code execution, resulting in full system compromise, data breaches, ransomware deployment, or disruption of essential services. The vulnerability threatens confidentiality by exposing sensitive data stored in memory, integrity by allowing code execution that can alter system behavior, and availability by potentially causing system outages. Given the network-based attack vector and no requirement for authentication, attackers can target exposed Remote Desktop Services directly from the internet or internal networks. This elevates the risk of widespread attacks, especially in organizations with insufficient network segmentation or outdated security controls. The absence of known exploits currently provides a window for proactive defense, but the high severity score demands urgent remediation to prevent future exploitation.

Mitigation Recommendations

1. Apply official security patches from Microsoft immediately once they become available for Windows Server 2012 systems. 2. Until patches are released, restrict Remote Desktop Services exposure by limiting RDP access to trusted IP addresses using firewalls or VPNs. 3. Disable RDS if not required or consider migrating to newer supported Windows Server versions with improved security. 4. Implement network segmentation to isolate critical servers and reduce attack surface. 5. Enable and monitor detailed logging of Remote Desktop connections and unusual activities to detect potential exploitation attempts early. 6. Employ endpoint detection and response (EDR) solutions capable of identifying memory exploitation and anomalous code execution behaviors. 7. Conduct regular vulnerability scans and penetration tests focused on RDS exposure and memory handling weaknesses. 8. Educate IT staff about this vulnerability and ensure incident response plans include scenarios involving remote code execution via RDS.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-01-16T23:11:19.731Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb302

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 2/14/2026, 8:53:33 AM

Last updated: 3/24/2026, 3:09:15 PM

Views: 81

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses