CVE-2025-26677: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows Server 2019
Uncontrolled resource consumption in Remote Desktop Gateway Service allows an unauthorized attacker to deny service over a network.
AI Analysis
Technical Summary
CVE-2025-26677 is a high-severity vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting Microsoft Windows Server 2019, specifically version 10.0.17763.0. The vulnerability resides in the Remote Desktop Gateway Service, which is responsible for securely tunneling Remote Desktop Protocol (RDP) sessions over HTTPS. An unauthorized attacker can exploit this flaw remotely without any authentication or user interaction by sending specially crafted requests to the Remote Desktop Gateway Service. This triggers excessive resource consumption on the affected server, leading to denial of service (DoS) conditions. The vulnerability does not impact confidentiality or integrity but severely affects availability by exhausting critical system resources such as memory, CPU, or network sockets. The CVSS 3.1 base score of 7.5 reflects the network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N), with a scope unchanged (S:U) and impact limited to availability (A:H). No known exploits are currently reported in the wild, and no patches have been released yet. However, the presence of this vulnerability in a core Windows Server component that is often exposed to external networks makes it a significant risk for organizations relying on Remote Desktop Gateway for secure remote access.
Potential Impact
For European organizations, the impact of CVE-2025-26677 can be substantial, especially for enterprises and public sector entities that depend on Windows Server 2019 Remote Desktop Gateway for remote workforce enablement, cloud services, and internal administrative access. Exploitation could lead to service outages, disrupting business continuity and critical operations. This is particularly concerning for sectors such as finance, healthcare, government, and telecommunications, where availability is crucial. The denial of service could also indirectly affect compliance with regulations like GDPR if service interruptions impact data processing or availability commitments. Additionally, the vulnerability could be leveraged as part of a multi-stage attack to distract or delay incident response teams while other malicious activities occur. Given the lack of authentication and user interaction requirements, attackers could scan and target exposed Remote Desktop Gateway endpoints en masse, increasing the risk of widespread disruption across European networks.
Mitigation Recommendations
Immediate mitigation steps include restricting external access to Remote Desktop Gateway services through network-level controls such as firewalls and VPNs, limiting exposure to trusted IP ranges only. Organizations should implement strict network segmentation to isolate Remote Desktop Gateway servers from critical infrastructure. Monitoring network traffic for unusual spikes or patterns indicative of resource exhaustion attacks is essential. Administrators should also review and harden Remote Desktop Gateway configurations, disabling unnecessary features and enforcing rate limiting if supported. Since no patches are currently available, applying vendor advisories promptly once released is critical. Additionally, deploying Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with signatures or heuristics targeting anomalous Remote Desktop Gateway traffic can help block exploit attempts. Regularly updating Windows Server 2019 to the latest cumulative updates and security patches will reduce exposure to related vulnerabilities. Finally, organizations should prepare incident response plans specifically addressing denial of service scenarios targeting Remote Desktop services.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-26677: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows Server 2019
Description
Uncontrolled resource consumption in Remote Desktop Gateway Service allows an unauthorized attacker to deny service over a network.
AI-Powered Analysis
Technical Analysis
CVE-2025-26677 is a high-severity vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting Microsoft Windows Server 2019, specifically version 10.0.17763.0. The vulnerability resides in the Remote Desktop Gateway Service, which is responsible for securely tunneling Remote Desktop Protocol (RDP) sessions over HTTPS. An unauthorized attacker can exploit this flaw remotely without any authentication or user interaction by sending specially crafted requests to the Remote Desktop Gateway Service. This triggers excessive resource consumption on the affected server, leading to denial of service (DoS) conditions. The vulnerability does not impact confidentiality or integrity but severely affects availability by exhausting critical system resources such as memory, CPU, or network sockets. The CVSS 3.1 base score of 7.5 reflects the network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N), with a scope unchanged (S:U) and impact limited to availability (A:H). No known exploits are currently reported in the wild, and no patches have been released yet. However, the presence of this vulnerability in a core Windows Server component that is often exposed to external networks makes it a significant risk for organizations relying on Remote Desktop Gateway for secure remote access.
Potential Impact
For European organizations, the impact of CVE-2025-26677 can be substantial, especially for enterprises and public sector entities that depend on Windows Server 2019 Remote Desktop Gateway for remote workforce enablement, cloud services, and internal administrative access. Exploitation could lead to service outages, disrupting business continuity and critical operations. This is particularly concerning for sectors such as finance, healthcare, government, and telecommunications, where availability is crucial. The denial of service could also indirectly affect compliance with regulations like GDPR if service interruptions impact data processing or availability commitments. Additionally, the vulnerability could be leveraged as part of a multi-stage attack to distract or delay incident response teams while other malicious activities occur. Given the lack of authentication and user interaction requirements, attackers could scan and target exposed Remote Desktop Gateway endpoints en masse, increasing the risk of widespread disruption across European networks.
Mitigation Recommendations
Immediate mitigation steps include restricting external access to Remote Desktop Gateway services through network-level controls such as firewalls and VPNs, limiting exposure to trusted IP ranges only. Organizations should implement strict network segmentation to isolate Remote Desktop Gateway servers from critical infrastructure. Monitoring network traffic for unusual spikes or patterns indicative of resource exhaustion attacks is essential. Administrators should also review and harden Remote Desktop Gateway configurations, disabling unnecessary features and enforcing rate limiting if supported. Since no patches are currently available, applying vendor advisories promptly once released is critical. Additionally, deploying Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with signatures or heuristics targeting anomalous Remote Desktop Gateway traffic can help block exploit attempts. Regularly updating Windows Server 2019 to the latest cumulative updates and security patches will reduce exposure to related vulnerabilities. Finally, organizations should prepare incident response plans specifically addressing denial of service scenarios targeting Remote Desktop services.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-02-12T22:35:41.550Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aeb944
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 9/10/2025, 3:11:57 AM
Last updated: 9/26/2025, 4:18:23 PM
Views: 21
Related Threats
CVE-2025-36262: CWE-1286 Improper Validation of Syntactic Correctness of Input in IBM Planning Analytics Local
MediumCVE-2025-36132: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IBM Planning Analytics Local
MediumCVE-2025-10659: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in MegaSys Telenium Online Web Application:
CriticalCVE-2025-41098: CWE-639 Authorization Bypass Through User-Controlled Key in GLOBAL PLANNING SOLUTIONS S.L (GPS) BOLD Workplanner
HighCVE-2025-11149: Denial of Service (DoS) in node-static
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.