Skip to main content

CVE-2025-26680: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows Server 2019

High
VulnerabilityCVE-2025-26680cvecve-2025-26680cwe-400
Published: Tue Apr 08 2025 (04/08/2025, 17:23:11 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows Server 2019

Description

Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.

AI-Powered Analysis

AILast updated: 07/11/2025, 04:03:30 UTC

Technical Analysis

CVE-2025-26680 is a high-severity vulnerability classified under CWE-400, indicating uncontrolled resource consumption, affecting Microsoft Windows Server 2019 (build 10.0.17763.0). The vulnerability exists in the Windows Standards-Based Storage Management Service, which is responsible for managing storage resources on Windows Server platforms. An unauthorized attacker can exploit this flaw remotely over a network without requiring any authentication or user interaction. By sending specially crafted requests to the vulnerable service, the attacker can cause excessive consumption of system resources such as CPU, memory, or disk I/O. This resource exhaustion leads to a denial-of-service (DoS) condition, rendering the affected server unresponsive or severely degraded in performance. The CVSS v3.1 base score of 7.5 reflects the high impact on availability (A:H) with no impact on confidentiality or integrity, and the attack vector is network-based with low attack complexity and no privileges or user interaction needed. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a significant risk for environments running Windows Server 2019, especially those exposed to untrusted networks. The lack of available patches at the time of publication increases the urgency for mitigation and monitoring.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to critical infrastructure and enterprise environments relying on Windows Server 2019 for storage management and other server roles. A successful DoS attack could disrupt business operations, leading to downtime of essential services such as file sharing, database hosting, and application delivery. This disruption can affect sectors like finance, healthcare, manufacturing, and government services where availability is paramount. Additionally, the ability to exploit this vulnerability remotely without authentication increases the attack surface, especially for organizations with externally facing servers or insufficient network segmentation. The resulting service outages could lead to financial losses, reputational damage, and potential regulatory non-compliance under frameworks like GDPR if service availability impacts data processing commitments.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement immediate compensating controls. These include restricting network access to the Windows Standards-Based Storage Management Service by applying strict firewall rules and network segmentation to limit exposure to untrusted networks. Employ intrusion detection and prevention systems (IDS/IPS) to monitor for anomalous traffic patterns indicative of resource exhaustion attacks targeting this service. Administrators should also review and harden server configurations to minimize unnecessary service exposure and disable the Standards-Based Storage Management Service if it is not essential for operational needs. Regular monitoring of system resource utilization and establishing alerting thresholds can help detect early signs of exploitation attempts. Once a patch becomes available, prompt testing and deployment are critical. Additionally, maintaining up-to-date backups and incident response plans will aid in recovery if an attack occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-02-12T22:35:41.551Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebb70

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/11/2025, 4:03:30 AM

Last updated: 8/13/2025, 1:06:46 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats