Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26677: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows Server 2016

0
High
VulnerabilityCVE-2025-26677cvecve-2025-26677cwe-400
Published: Tue May 13 2025 (05/13/2025, 16:58:54 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows Server 2016

Description

Uncontrolled resource consumption in Remote Desktop Gateway Service allows an unauthorized attacker to deny service over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 09:35:04 UTC

Technical Analysis

CVE-2025-26677 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting the Remote Desktop Gateway Service component of Microsoft Windows Server 2016 (version 10.0.14393.0). This vulnerability allows an unauthenticated attacker to send specially crafted requests that cause the service to consume excessive system resources such as CPU, memory, or network bandwidth. The result is a denial of service condition where legitimate users are unable to access remote desktop services. The CVSS v3.1 base score is 7.5 (high), reflecting the network attack vector (AV:N), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:H) without affecting confidentiality or integrity. The scope remains unchanged (S:U), meaning the impact is contained within the vulnerable component. No exploits have been reported in the wild yet, but the vulnerability was publicly disclosed on May 13, 2025, with no patches currently available. The Remote Desktop Gateway Service is commonly used in enterprise environments to securely provide remote access to internal network resources, making this vulnerability particularly concerning for organizations relying on Windows Server 2016 for remote connectivity. The lack of authentication requirement and low attack complexity increase the risk of exploitation. The vulnerability was reserved in February 2025 and enriched by CISA, indicating recognition by US cybersecurity authorities. The absence of patch links suggests that organizations must monitor vendor advisories closely for updates.

Potential Impact

For European organizations, this vulnerability poses a significant threat to the availability of remote desktop services, which are critical for remote work, IT administration, and business continuity. Exploitation could lead to denial of service, disrupting access to internal systems and potentially halting operations dependent on remote connectivity. Sectors such as finance, healthcare, government, and critical infrastructure that rely heavily on Windows Server 2016 for secure remote access are particularly vulnerable. The disruption could also affect cloud service providers and managed service providers hosting Windows Server 2016 environments, amplifying the impact across multiple clients. Additionally, prolonged service outages could lead to financial losses, reputational damage, and regulatory compliance issues under frameworks like GDPR if service availability commitments are not met. The vulnerability's ease of exploitation without authentication increases the risk of opportunistic attacks, especially in environments exposed to the internet or poorly segmented networks.

Mitigation Recommendations

1. Monitor Microsoft security advisories closely and apply patches immediately once released to remediate the vulnerability. 2. Until patches are available, implement network-level protections such as firewall rules to restrict access to the Remote Desktop Gateway Service to trusted IP addresses only. 3. Deploy rate limiting and connection throttling on Remote Desktop Gateway endpoints to mitigate resource exhaustion attempts. 4. Segment the network to isolate Remote Desktop Gateway servers from less trusted network zones and limit exposure. 5. Use intrusion detection/prevention systems (IDS/IPS) to detect anomalous traffic patterns indicative of resource exhaustion attacks. 6. Regularly audit and monitor system resource usage and logs for early signs of exploitation attempts. 7. Consider upgrading to supported Windows Server versions with active security support and improved mitigations. 8. Educate IT staff on recognizing and responding to denial of service incidents related to remote access services.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-02-12T22:35:41.550Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aeb944

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/14/2026, 9:35:04 AM

Last updated: 3/24/2026, 8:35:23 PM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses