CVE-2025-26667: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Windows Server 2019
Exposure of sensitive information to an unauthorized actor in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
AI Analysis
Technical Summary
CVE-2025-26667 is a vulnerability identified in Microsoft Windows Server 2019, specifically affecting the Routing and Remote Access Service (RRAS). This vulnerability is classified under CWE-200, which pertains to the exposure of sensitive information to unauthorized actors. The flaw allows an attacker to disclose sensitive information over the network without requiring any privileges or authentication, though user interaction is necessary to trigger the information disclosure. The CVSS v3.1 base score for this vulnerability is 6.5, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), but requires user interaction (UI:R). The scope is unchanged (S:U), and the impact is high on confidentiality (C:H), with no impact on integrity or availability (I:N, A:N). This means that an attacker can potentially intercept or access sensitive data transmitted or handled by RRAS, which could include routing configurations, network topology information, or other sensitive network data. However, the vulnerability does not allow modification or disruption of services. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in February 2025 and published in April 2025, indicating it is a recent discovery. RRAS is a critical component in Windows Server environments for managing VPNs, dial-up connections, and routing protocols, making this vulnerability relevant for organizations relying on these services for remote access and network management.
Potential Impact
For European organizations, the exposure of sensitive information through RRAS on Windows Server 2019 can have significant repercussions. Many enterprises, government agencies, and critical infrastructure providers in Europe utilize Windows Server 2019 for their network services, including VPN and remote access solutions. The unauthorized disclosure of sensitive network configuration or routing information could facilitate further targeted attacks, such as network reconnaissance, lateral movement, or exploitation of other vulnerabilities. This is particularly concerning for sectors with stringent data protection requirements under GDPR, as leakage of sensitive information could lead to compliance violations and reputational damage. Additionally, organizations involved in critical infrastructure, finance, healthcare, and government operations could face increased risk if attackers leverage disclosed information to plan more sophisticated attacks. Although the vulnerability does not directly allow service disruption or data modification, the confidentiality breach alone can undermine network security posture and trust.
Mitigation Recommendations
Given the absence of an official patch at the time of this report, European organizations should implement several specific mitigations: 1) Restrict RRAS exposure by limiting network access to RRAS services using network segmentation and firewall rules, allowing only trusted IP addresses and VPN clients to connect. 2) Monitor RRAS logs and network traffic for unusual or unauthorized access attempts that could indicate exploitation attempts. 3) Employ network-level encryption and secure authentication mechanisms for remote access to reduce the risk of data interception. 4) Disable RRAS services if not required or consider alternative VPN and routing solutions with a stronger security track record. 5) Prepare for rapid deployment of patches once released by Microsoft by maintaining an up-to-date asset inventory and patch management process. 6) Conduct regular security assessments and penetration testing focused on RRAS and remote access infrastructure to identify and remediate potential weaknesses. 7) Educate users about the risks of interacting with unsolicited network prompts or connections that could trigger the vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Switzerland
CVE-2025-26667: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Windows Server 2019
Description
Exposure of sensitive information to an unauthorized actor in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.
AI-Powered Analysis
Technical Analysis
CVE-2025-26667 is a vulnerability identified in Microsoft Windows Server 2019, specifically affecting the Routing and Remote Access Service (RRAS). This vulnerability is classified under CWE-200, which pertains to the exposure of sensitive information to unauthorized actors. The flaw allows an attacker to disclose sensitive information over the network without requiring any privileges or authentication, though user interaction is necessary to trigger the information disclosure. The CVSS v3.1 base score for this vulnerability is 6.5, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), but requires user interaction (UI:R). The scope is unchanged (S:U), and the impact is high on confidentiality (C:H), with no impact on integrity or availability (I:N, A:N). This means that an attacker can potentially intercept or access sensitive data transmitted or handled by RRAS, which could include routing configurations, network topology information, or other sensitive network data. However, the vulnerability does not allow modification or disruption of services. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in February 2025 and published in April 2025, indicating it is a recent discovery. RRAS is a critical component in Windows Server environments for managing VPNs, dial-up connections, and routing protocols, making this vulnerability relevant for organizations relying on these services for remote access and network management.
Potential Impact
For European organizations, the exposure of sensitive information through RRAS on Windows Server 2019 can have significant repercussions. Many enterprises, government agencies, and critical infrastructure providers in Europe utilize Windows Server 2019 for their network services, including VPN and remote access solutions. The unauthorized disclosure of sensitive network configuration or routing information could facilitate further targeted attacks, such as network reconnaissance, lateral movement, or exploitation of other vulnerabilities. This is particularly concerning for sectors with stringent data protection requirements under GDPR, as leakage of sensitive information could lead to compliance violations and reputational damage. Additionally, organizations involved in critical infrastructure, finance, healthcare, and government operations could face increased risk if attackers leverage disclosed information to plan more sophisticated attacks. Although the vulnerability does not directly allow service disruption or data modification, the confidentiality breach alone can undermine network security posture and trust.
Mitigation Recommendations
Given the absence of an official patch at the time of this report, European organizations should implement several specific mitigations: 1) Restrict RRAS exposure by limiting network access to RRAS services using network segmentation and firewall rules, allowing only trusted IP addresses and VPN clients to connect. 2) Monitor RRAS logs and network traffic for unusual or unauthorized access attempts that could indicate exploitation attempts. 3) Employ network-level encryption and secure authentication mechanisms for remote access to reduce the risk of data interception. 4) Disable RRAS services if not required or consider alternative VPN and routing solutions with a stronger security track record. 5) Prepare for rapid deployment of patches once released by Microsoft by maintaining an up-to-date asset inventory and patch management process. 6) Conduct regular security assessments and penetration testing focused on RRAS and remote access infrastructure to identify and remediate potential weaknesses. 7) Educate users about the risks of interacting with unsolicited network prompts or connections that could trigger the vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-02-12T22:35:41.548Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aebb4d
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 7/11/2025, 3:48:50 AM
Last updated: 8/12/2025, 5:49:14 AM
Views: 13
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.