Skip to main content

CVE-2025-26652: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows Server 2019

High
VulnerabilityCVE-2025-26652cvecve-2025-26652cwe-400
Published: Tue Apr 08 2025 (04/08/2025, 17:23:50 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows Server 2019

Description

Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.

AI-Powered Analysis

AILast updated: 07/11/2025, 03:47:54 UTC

Technical Analysis

CVE-2025-26652 is a high-severity vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting Microsoft Windows Server 2019, specifically version 10.0.17763.0. The flaw exists in the Windows Standards-Based Storage Management Service, which is responsible for managing storage resources on the server. An unauthorized attacker can exploit this vulnerability remotely over the network without requiring any authentication or user interaction. By sending specially crafted requests to the vulnerable service, the attacker can cause excessive consumption of system resources such as CPU, memory, or disk I/O, leading to a denial of service (DoS) condition. This results in the affected server becoming unresponsive or crashing, thereby disrupting availability of critical services hosted on the server. The CVSS v3.1 base score of 7.5 reflects the high impact on availability (A:H), with no impact on confidentiality or integrity, and the ease of exploitation (network attack vector, no privileges or user interaction needed). No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that mitigation may rely on workarounds or monitoring until an official update is released. The vulnerability was reserved in February 2025 and published in April 2025, showing recent discovery and disclosure. Given the critical role of Windows Server 2019 in enterprise environments, this vulnerability poses a significant risk to organizations relying on this platform for storage management and other server functions.

Potential Impact

For European organizations, the impact of CVE-2025-26652 can be substantial, especially for those operating critical infrastructure, data centers, cloud services, or enterprise IT environments that utilize Windows Server 2019. A successful exploitation can lead to denial of service, causing downtime of business-critical applications, disruption of services, and potential financial losses. Sectors such as finance, healthcare, manufacturing, and government agencies that depend heavily on Windows Server infrastructure could face operational interruptions. Additionally, the unavailability of storage management services could complicate data access and backup operations, increasing recovery times and operational risk. Since the attack requires no authentication and can be launched remotely, it broadens the attack surface and increases the likelihood of exploitation attempts. The lack of current known exploits provides a window for proactive defense, but also means organizations must be vigilant in monitoring network traffic and resource usage to detect potential abuse. The impact on confidentiality and integrity is minimal, but the availability impact alone is critical for maintaining business continuity.

Mitigation Recommendations

To mitigate CVE-2025-26652 effectively, European organizations should: 1) Immediately inventory and identify all Windows Server 2019 systems running version 10.0.17763.0, focusing on those exposing the Standards-Based Storage Management Service to network access. 2) Implement network-level controls such as firewall rules or segmentation to restrict access to the vulnerable service only to trusted management hosts or internal networks, minimizing exposure to untrusted external sources. 3) Monitor server resource utilization closely using performance monitoring tools and set alerts for abnormal spikes in CPU, memory, or disk I/O that could indicate exploitation attempts. 4) Apply any available vendor advisories or temporary workarounds from Microsoft, such as disabling or limiting the affected service if feasible without disrupting business operations. 5) Prepare for rapid deployment of official patches once released by Microsoft by establishing a tested update process and prioritizing affected systems. 6) Conduct regular vulnerability scanning and penetration testing to verify that the vulnerability is addressed and no residual exposure remains. 7) Educate IT and security teams about the nature of the vulnerability and signs of exploitation to improve detection and response capabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-02-12T19:23:29.270Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebb38

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/11/2025, 3:47:54 AM

Last updated: 8/11/2025, 9:09:12 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats