CVE-2025-26677: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows Server 2016
Uncontrolled resource consumption in Remote Desktop Gateway Service allows an unauthorized attacker to deny service over a network.
AI Analysis
Technical Summary
CVE-2025-26677 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting the Remote Desktop Gateway Service component of Microsoft Windows Server 2016 (version 10.0.14393.0). This vulnerability allows an unauthenticated attacker to send specially crafted requests that cause the service to consume excessive system resources such as CPU, memory, or network bandwidth. The result is a denial of service condition where legitimate users are unable to access remote desktop services. The CVSS v3.1 base score is 7.5 (high), reflecting the network attack vector (AV:N), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:H) without affecting confidentiality or integrity. The scope remains unchanged (S:U), meaning the impact is contained within the vulnerable component. No exploits have been reported in the wild yet, but the vulnerability was publicly disclosed on May 13, 2025, with no patches currently available. The Remote Desktop Gateway Service is commonly used in enterprise environments to securely provide remote access to internal network resources, making this vulnerability particularly concerning for organizations relying on Windows Server 2016 for remote connectivity. The lack of authentication requirement and low attack complexity increase the risk of exploitation. The vulnerability was reserved in February 2025 and enriched by CISA, indicating recognition by US cybersecurity authorities. The absence of patch links suggests that organizations must monitor vendor advisories closely for updates.
Potential Impact
For European organizations, this vulnerability poses a significant threat to the availability of remote desktop services, which are critical for remote work, IT administration, and business continuity. Exploitation could lead to denial of service, disrupting access to internal systems and potentially halting operations dependent on remote connectivity. Sectors such as finance, healthcare, government, and critical infrastructure that rely heavily on Windows Server 2016 for secure remote access are particularly vulnerable. The disruption could also affect cloud service providers and managed service providers hosting Windows Server 2016 environments, amplifying the impact across multiple clients. Additionally, prolonged service outages could lead to financial losses, reputational damage, and regulatory compliance issues under frameworks like GDPR if service availability commitments are not met. The vulnerability's ease of exploitation without authentication increases the risk of opportunistic attacks, especially in environments exposed to the internet or poorly segmented networks.
Mitigation Recommendations
1. Monitor Microsoft security advisories closely and apply patches immediately once released to remediate the vulnerability. 2. Until patches are available, implement network-level protections such as firewall rules to restrict access to the Remote Desktop Gateway Service to trusted IP addresses only. 3. Deploy rate limiting and connection throttling on Remote Desktop Gateway endpoints to mitigate resource exhaustion attempts. 4. Segment the network to isolate Remote Desktop Gateway servers from less trusted network zones and limit exposure. 5. Use intrusion detection/prevention systems (IDS/IPS) to detect anomalous traffic patterns indicative of resource exhaustion attacks. 6. Regularly audit and monitor system resource usage and logs for early signs of exploitation attempts. 7. Consider upgrading to supported Windows Server versions with active security support and improved mitigations. 8. Educate IT staff on recognizing and responding to denial of service incidents related to remote access services.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-26677: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows Server 2016
Description
Uncontrolled resource consumption in Remote Desktop Gateway Service allows an unauthorized attacker to deny service over a network.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-26677 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting the Remote Desktop Gateway Service component of Microsoft Windows Server 2016 (version 10.0.14393.0). This vulnerability allows an unauthenticated attacker to send specially crafted requests that cause the service to consume excessive system resources such as CPU, memory, or network bandwidth. The result is a denial of service condition where legitimate users are unable to access remote desktop services. The CVSS v3.1 base score is 7.5 (high), reflecting the network attack vector (AV:N), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:H) without affecting confidentiality or integrity. The scope remains unchanged (S:U), meaning the impact is contained within the vulnerable component. No exploits have been reported in the wild yet, but the vulnerability was publicly disclosed on May 13, 2025, with no patches currently available. The Remote Desktop Gateway Service is commonly used in enterprise environments to securely provide remote access to internal network resources, making this vulnerability particularly concerning for organizations relying on Windows Server 2016 for remote connectivity. The lack of authentication requirement and low attack complexity increase the risk of exploitation. The vulnerability was reserved in February 2025 and enriched by CISA, indicating recognition by US cybersecurity authorities. The absence of patch links suggests that organizations must monitor vendor advisories closely for updates.
Potential Impact
For European organizations, this vulnerability poses a significant threat to the availability of remote desktop services, which are critical for remote work, IT administration, and business continuity. Exploitation could lead to denial of service, disrupting access to internal systems and potentially halting operations dependent on remote connectivity. Sectors such as finance, healthcare, government, and critical infrastructure that rely heavily on Windows Server 2016 for secure remote access are particularly vulnerable. The disruption could also affect cloud service providers and managed service providers hosting Windows Server 2016 environments, amplifying the impact across multiple clients. Additionally, prolonged service outages could lead to financial losses, reputational damage, and regulatory compliance issues under frameworks like GDPR if service availability commitments are not met. The vulnerability's ease of exploitation without authentication increases the risk of opportunistic attacks, especially in environments exposed to the internet or poorly segmented networks.
Mitigation Recommendations
1. Monitor Microsoft security advisories closely and apply patches immediately once released to remediate the vulnerability. 2. Until patches are available, implement network-level protections such as firewall rules to restrict access to the Remote Desktop Gateway Service to trusted IP addresses only. 3. Deploy rate limiting and connection throttling on Remote Desktop Gateway endpoints to mitigate resource exhaustion attempts. 4. Segment the network to isolate Remote Desktop Gateway servers from less trusted network zones and limit exposure. 5. Use intrusion detection/prevention systems (IDS/IPS) to detect anomalous traffic patterns indicative of resource exhaustion attacks. 6. Regularly audit and monitor system resource usage and logs for early signs of exploitation attempts. 7. Consider upgrading to supported Windows Server versions with active security support and improved mitigations. 8. Educate IT staff on recognizing and responding to denial of service incidents related to remote access services.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-02-12T22:35:41.550Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aeb944
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 2/14/2026, 9:35:04 AM
Last updated: 3/24/2026, 8:35:23 PM
Views: 61
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.