Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26667: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Windows Server 2008 R2 Service Pack 1

0
Medium
VulnerabilityCVE-2025-26667cvecve-2025-26667cwe-200
Published: Tue Apr 08 2025 (04/08/2025, 17:23:09 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows Server 2008 R2 Service Pack 1

Description

Exposure of sensitive information to an unauthorized actor in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 09:11:29 UTC

Technical Analysis

CVE-2025-26667 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting Microsoft Windows Server 2008 R2 Service Pack 1, specifically the Routing and Remote Access Service (RRAS) component. This vulnerability allows an attacker to remotely disclose sensitive information over the network without requiring any privileges (PR:N) but does require user interaction (UI:R), such as a user initiating a connection or interaction that triggers the exposure. The attack vector is network-based (AV:N), meaning the attacker does not need physical or local access. The vulnerability does not impact the integrity or availability of the system but compromises confidentiality by leaking sensitive data. The CVSS v3.1 base score is 6.5, indicating a medium severity level, with the exploitability being relatively straightforward due to low attack complexity (AC:L) and no privileges required. The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component without impacting other system components. At the time of publication, no patches have been released, and no known exploits are reported in the wild. The vulnerability is significant for environments still running legacy Windows Server 2008 R2 systems with RRAS enabled, which is commonly used to provide routing and remote access capabilities in enterprise networks. Attackers could leverage this vulnerability to gain unauthorized access to sensitive information transmitted or processed by RRAS, potentially leading to further targeted attacks or data breaches.

Potential Impact

For European organizations, the primary impact of CVE-2025-26667 lies in the unauthorized disclosure of sensitive information, which can include configuration details, network topology, or authentication data related to RRAS. This exposure can facilitate reconnaissance and subsequent attacks, increasing the risk of data breaches and compliance violations under regulations such as GDPR. Organizations in sectors with critical infrastructure, finance, healthcare, and government services are particularly vulnerable due to their reliance on secure remote access and legacy systems. The vulnerability's exploitation could undermine trust in remote access services and lead to operational disruptions if attackers use disclosed information to escalate attacks. Since Windows Server 2008 R2 is an older platform, many organizations may have limited visibility or outdated security controls, exacerbating the risk. The lack of available patches at the time of disclosure means organizations must rely on interim mitigations, increasing operational complexity. Overall, the vulnerability poses a moderate risk to confidentiality with potential cascading effects on organizational security posture and regulatory compliance in Europe.

Mitigation Recommendations

1. Disable the Routing and Remote Access Service (RRAS) on Windows Server 2008 R2 systems if it is not essential for business operations to eliminate the attack surface. 2. If RRAS is required, restrict network exposure by implementing strict firewall rules to limit access only to trusted IP addresses and networks. 3. Employ network segmentation to isolate legacy servers running Windows Server 2008 R2 from critical infrastructure and sensitive data repositories. 4. Monitor network traffic for unusual or unauthorized connection attempts targeting RRAS services, using intrusion detection/prevention systems (IDS/IPS) and security information and event management (SIEM) tools. 5. Enforce strong user authentication and minimize user interaction that could trigger the vulnerability, such as educating users about phishing or social engineering risks that might lead to exploitation. 6. Plan and prioritize upgrading or migrating from Windows Server 2008 R2 to supported versions to reduce exposure to legacy vulnerabilities. 7. Stay alert for official patches or security advisories from Microsoft and apply updates promptly once available. 8. Conduct regular vulnerability assessments and penetration testing focused on remote access services to identify and remediate potential weaknesses.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-02-12T22:35:41.548Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebb4d

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/14/2026, 9:11:29 AM

Last updated: 3/25/2026, 10:49:32 AM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses