Skip to main content

CVE-2025-26667: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Windows Server 2019

Medium
VulnerabilityCVE-2025-26667cvecve-2025-26667cwe-200
Published: Tue Apr 08 2025 (04/08/2025, 17:23:09 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows Server 2019

Description

Exposure of sensitive information to an unauthorized actor in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.

AI-Powered Analysis

AILast updated: 07/11/2025, 03:48:50 UTC

Technical Analysis

CVE-2025-26667 is a vulnerability identified in Microsoft Windows Server 2019, specifically affecting the Routing and Remote Access Service (RRAS). This vulnerability is classified under CWE-200, which pertains to the exposure of sensitive information to unauthorized actors. The flaw allows an attacker to disclose sensitive information over the network without requiring any privileges or authentication, though user interaction is necessary to trigger the information disclosure. The CVSS v3.1 base score for this vulnerability is 6.5, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), but requires user interaction (UI:R). The scope is unchanged (S:U), and the impact is high on confidentiality (C:H), with no impact on integrity or availability (I:N, A:N). This means that an attacker can potentially intercept or access sensitive data transmitted or handled by RRAS, which could include routing configurations, network topology information, or other sensitive network data. However, the vulnerability does not allow modification or disruption of services. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in February 2025 and published in April 2025, indicating it is a recent discovery. RRAS is a critical component in Windows Server environments for managing VPNs, dial-up connections, and routing protocols, making this vulnerability relevant for organizations relying on these services for remote access and network management.

Potential Impact

For European organizations, the exposure of sensitive information through RRAS on Windows Server 2019 can have significant repercussions. Many enterprises, government agencies, and critical infrastructure providers in Europe utilize Windows Server 2019 for their network services, including VPN and remote access solutions. The unauthorized disclosure of sensitive network configuration or routing information could facilitate further targeted attacks, such as network reconnaissance, lateral movement, or exploitation of other vulnerabilities. This is particularly concerning for sectors with stringent data protection requirements under GDPR, as leakage of sensitive information could lead to compliance violations and reputational damage. Additionally, organizations involved in critical infrastructure, finance, healthcare, and government operations could face increased risk if attackers leverage disclosed information to plan more sophisticated attacks. Although the vulnerability does not directly allow service disruption or data modification, the confidentiality breach alone can undermine network security posture and trust.

Mitigation Recommendations

Given the absence of an official patch at the time of this report, European organizations should implement several specific mitigations: 1) Restrict RRAS exposure by limiting network access to RRAS services using network segmentation and firewall rules, allowing only trusted IP addresses and VPN clients to connect. 2) Monitor RRAS logs and network traffic for unusual or unauthorized access attempts that could indicate exploitation attempts. 3) Employ network-level encryption and secure authentication mechanisms for remote access to reduce the risk of data interception. 4) Disable RRAS services if not required or consider alternative VPN and routing solutions with a stronger security track record. 5) Prepare for rapid deployment of patches once released by Microsoft by maintaining an up-to-date asset inventory and patch management process. 6) Conduct regular security assessments and penetration testing focused on RRAS and remote access infrastructure to identify and remediate potential weaknesses. 7) Educate users about the risks of interacting with unsolicited network prompts or connections that could trigger the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-02-12T22:35:41.548Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebb4d

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/11/2025, 3:48:50 AM

Last updated: 8/12/2025, 5:49:14 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats