Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24045: CWE-591: Sensitive Data Storage in Improperly Locked Memory in Microsoft Windows Server 2019

0
High
VulnerabilityCVE-2025-24045cvecve-2025-24045cwe-591
Published: Tue Mar 11 2025 (03/11/2025, 16:59:07 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows Server 2019

Description

Sensitive data storage in improperly locked memory in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network.

AI-Powered Analysis

AILast updated: 12/17/2025, 23:49:58 UTC

Technical Analysis

CVE-2025-24045 is a vulnerability identified in Microsoft Windows Server 2019, specifically affecting the Remote Desktop Services (RDS) component. The root cause is the improper locking of memory that stores sensitive data, categorized under CWE-591 (Sensitive Data Storage in Improperly Locked Memory). This improper memory handling allows an attacker to remotely execute arbitrary code without requiring authentication or user interaction, exploiting the flaw over the network. The vulnerability was reserved in January 2025 and published in March 2025, with a CVSS v3.1 base score of 8.1, indicating high severity. The attack vector is network-based (AV:N), with high attack complexity (AC:H), no privileges required (PR:N), and no user interaction needed (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although no public exploits are known yet, the vulnerability poses a significant risk due to the potential for full system compromise via remote code execution. Windows Server 2019 is widely used in enterprise environments, often hosting critical applications and services, making this vulnerability particularly dangerous. The lack of available patches at the time of reporting necessitates immediate risk mitigation through network controls and monitoring until official updates are released.

Potential Impact

For European organizations, the impact of CVE-2025-24045 could be severe. Remote Desktop Services are commonly used for remote administration and access to critical systems. Exploitation could lead to unauthorized remote code execution, allowing attackers to gain control over affected servers. This compromises confidentiality by exposing sensitive data stored in memory, integrity by enabling malicious code execution, and availability by potentially causing system crashes or denial of service. Critical sectors such as finance, healthcare, government, and manufacturing could face operational disruptions, data breaches, and regulatory compliance violations (e.g., GDPR). The high attack complexity somewhat limits exploitation but does not eliminate risk, especially for well-resourced threat actors. The vulnerability's network-based nature means that exposed RDS endpoints on the internet or poorly segmented internal networks are at highest risk. The absence of known exploits currently provides a window for proactive defense, but the potential for rapid weaponization is high given the vulnerability's characteristics.

Mitigation Recommendations

1. Apply official patches from Microsoft immediately once they become available to address the memory locking issue in RDS. 2. Until patches are released, restrict network access to Remote Desktop Services by implementing strict firewall rules, allowing only trusted IP addresses and VPN connections. 3. Employ network segmentation to isolate servers running Windows Server 2019 RDS from general user networks and the internet. 4. Enable and monitor detailed logging and alerting for unusual RDS activity, including failed connection attempts and unexpected process executions. 5. Use endpoint detection and response (EDR) tools to detect anomalous behavior indicative of exploitation attempts. 6. Disable RDS if not required or reduce its attack surface by limiting features and enforcing strong authentication mechanisms. 7. Conduct regular vulnerability scanning and penetration testing focused on RDS exposure. 8. Educate IT staff on this vulnerability and ensure incident response plans include scenarios involving RDS compromise. 9. Review and enforce least privilege principles for accounts with RDS access to minimize potential damage from exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-01-16T23:11:19.731Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb302

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 12/17/2025, 11:49:58 PM

Last updated: 1/19/2026, 9:58:18 AM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats