CVE-2025-26677: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows Server 2019
Uncontrolled resource consumption in Remote Desktop Gateway Service allows an unauthorized attacker to deny service over a network.
AI Analysis
Technical Summary
CVE-2025-26677 is a high-severity vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting Microsoft Windows Server 2019, specifically version 10.0.17763.0. The vulnerability resides in the Remote Desktop Gateway Service, which is responsible for securely tunneling Remote Desktop Protocol (RDP) sessions over HTTPS. An unauthorized attacker can exploit this flaw remotely without any authentication or user interaction by sending specially crafted requests to the Remote Desktop Gateway Service. This triggers excessive resource consumption on the affected server, leading to denial of service (DoS) conditions. The vulnerability does not impact confidentiality or integrity but severely affects availability by exhausting critical system resources such as memory, CPU, or network sockets. The CVSS 3.1 base score of 7.5 reflects the network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N), with a scope unchanged (S:U) and impact limited to availability (A:H). No known exploits are currently reported in the wild, and no patches have been released yet. However, the presence of this vulnerability in a core Windows Server component that is often exposed to external networks makes it a significant risk for organizations relying on Remote Desktop Gateway for secure remote access.
Potential Impact
For European organizations, the impact of CVE-2025-26677 can be substantial, especially for enterprises and public sector entities that depend on Windows Server 2019 Remote Desktop Gateway for remote workforce enablement, cloud services, and internal administrative access. Exploitation could lead to service outages, disrupting business continuity and critical operations. This is particularly concerning for sectors such as finance, healthcare, government, and telecommunications, where availability is crucial. The denial of service could also indirectly affect compliance with regulations like GDPR if service interruptions impact data processing or availability commitments. Additionally, the vulnerability could be leveraged as part of a multi-stage attack to distract or delay incident response teams while other malicious activities occur. Given the lack of authentication and user interaction requirements, attackers could scan and target exposed Remote Desktop Gateway endpoints en masse, increasing the risk of widespread disruption across European networks.
Mitigation Recommendations
Immediate mitigation steps include restricting external access to Remote Desktop Gateway services through network-level controls such as firewalls and VPNs, limiting exposure to trusted IP ranges only. Organizations should implement strict network segmentation to isolate Remote Desktop Gateway servers from critical infrastructure. Monitoring network traffic for unusual spikes or patterns indicative of resource exhaustion attacks is essential. Administrators should also review and harden Remote Desktop Gateway configurations, disabling unnecessary features and enforcing rate limiting if supported. Since no patches are currently available, applying vendor advisories promptly once released is critical. Additionally, deploying Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with signatures or heuristics targeting anomalous Remote Desktop Gateway traffic can help block exploit attempts. Regularly updating Windows Server 2019 to the latest cumulative updates and security patches will reduce exposure to related vulnerabilities. Finally, organizations should prepare incident response plans specifically addressing denial of service scenarios targeting Remote Desktop services.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-26677: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows Server 2019
Description
Uncontrolled resource consumption in Remote Desktop Gateway Service allows an unauthorized attacker to deny service over a network.
AI-Powered Analysis
Technical Analysis
CVE-2025-26677 is a high-severity vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting Microsoft Windows Server 2019, specifically version 10.0.17763.0. The vulnerability resides in the Remote Desktop Gateway Service, which is responsible for securely tunneling Remote Desktop Protocol (RDP) sessions over HTTPS. An unauthorized attacker can exploit this flaw remotely without any authentication or user interaction by sending specially crafted requests to the Remote Desktop Gateway Service. This triggers excessive resource consumption on the affected server, leading to denial of service (DoS) conditions. The vulnerability does not impact confidentiality or integrity but severely affects availability by exhausting critical system resources such as memory, CPU, or network sockets. The CVSS 3.1 base score of 7.5 reflects the network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N), with a scope unchanged (S:U) and impact limited to availability (A:H). No known exploits are currently reported in the wild, and no patches have been released yet. However, the presence of this vulnerability in a core Windows Server component that is often exposed to external networks makes it a significant risk for organizations relying on Remote Desktop Gateway for secure remote access.
Potential Impact
For European organizations, the impact of CVE-2025-26677 can be substantial, especially for enterprises and public sector entities that depend on Windows Server 2019 Remote Desktop Gateway for remote workforce enablement, cloud services, and internal administrative access. Exploitation could lead to service outages, disrupting business continuity and critical operations. This is particularly concerning for sectors such as finance, healthcare, government, and telecommunications, where availability is crucial. The denial of service could also indirectly affect compliance with regulations like GDPR if service interruptions impact data processing or availability commitments. Additionally, the vulnerability could be leveraged as part of a multi-stage attack to distract or delay incident response teams while other malicious activities occur. Given the lack of authentication and user interaction requirements, attackers could scan and target exposed Remote Desktop Gateway endpoints en masse, increasing the risk of widespread disruption across European networks.
Mitigation Recommendations
Immediate mitigation steps include restricting external access to Remote Desktop Gateway services through network-level controls such as firewalls and VPNs, limiting exposure to trusted IP ranges only. Organizations should implement strict network segmentation to isolate Remote Desktop Gateway servers from critical infrastructure. Monitoring network traffic for unusual spikes or patterns indicative of resource exhaustion attacks is essential. Administrators should also review and harden Remote Desktop Gateway configurations, disabling unnecessary features and enforcing rate limiting if supported. Since no patches are currently available, applying vendor advisories promptly once released is critical. Additionally, deploying Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with signatures or heuristics targeting anomalous Remote Desktop Gateway traffic can help block exploit attempts. Regularly updating Windows Server 2019 to the latest cumulative updates and security patches will reduce exposure to related vulnerabilities. Finally, organizations should prepare incident response plans specifically addressing denial of service scenarios targeting Remote Desktop services.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-02-12T22:35:41.550Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aeb944
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 9/10/2025, 3:11:57 AM
Last updated: 11/20/2025, 1:34:26 PM
Views: 31
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-40601: CWE-121 Stack-based Buffer Overflow in SonicWall SonicOS
UnknownCVE-2025-40605: CWE-23 Relative Path Traversal in SonicWall Email Security
UnknownCVE-2025-40604: CWE-494 Download of Code Without Integrity Check in SonicWall Email Security
UnknownCVE-2025-12414: CWE-290 Authentication Bypass by Spoofing in Google Cloud Looker
CriticalCVE-2025-62346: CWE-352 Cross-Site Request Forgery (CSRF) in HCL Software Glovius Cloud
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.