CVE-2025-26680: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows Server 2019
Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.
AI Analysis
Technical Summary
CVE-2025-26680 is a high-severity vulnerability classified under CWE-400, indicating uncontrolled resource consumption, affecting Microsoft Windows Server 2019 (build 10.0.17763.0). The vulnerability exists in the Windows Standards-Based Storage Management Service, which is responsible for managing storage resources on Windows Server platforms. An unauthorized attacker can exploit this flaw remotely over a network without requiring any authentication or user interaction. By sending specially crafted requests to the vulnerable service, the attacker can cause excessive consumption of system resources such as CPU, memory, or disk I/O. This resource exhaustion leads to a denial-of-service (DoS) condition, rendering the affected server unresponsive or severely degraded in performance. The CVSS v3.1 base score of 7.5 reflects the high impact on availability (A:H) with no impact on confidentiality or integrity, and the attack vector is network-based with low attack complexity and no privileges or user interaction needed. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a significant risk for environments running Windows Server 2019, especially those exposed to untrusted networks. The lack of available patches at the time of publication increases the urgency for mitigation and monitoring.
Potential Impact
For European organizations, this vulnerability poses a substantial risk to critical infrastructure and enterprise environments relying on Windows Server 2019 for storage management and other server roles. A successful DoS attack could disrupt business operations, leading to downtime of essential services such as file sharing, database hosting, and application delivery. This disruption can affect sectors like finance, healthcare, manufacturing, and government services where availability is paramount. Additionally, the ability to exploit this vulnerability remotely without authentication increases the attack surface, especially for organizations with externally facing servers or insufficient network segmentation. The resulting service outages could lead to financial losses, reputational damage, and potential regulatory non-compliance under frameworks like GDPR if service availability impacts data processing commitments.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement immediate compensating controls. These include restricting network access to the Windows Standards-Based Storage Management Service by applying strict firewall rules and network segmentation to limit exposure to untrusted networks. Employ intrusion detection and prevention systems (IDS/IPS) to monitor for anomalous traffic patterns indicative of resource exhaustion attacks targeting this service. Administrators should also review and harden server configurations to minimize unnecessary service exposure and disable the Standards-Based Storage Management Service if it is not essential for operational needs. Regular monitoring of system resource utilization and establishing alerting thresholds can help detect early signs of exploitation attempts. Once a patch becomes available, prompt testing and deployment are critical. Additionally, maintaining up-to-date backups and incident response plans will aid in recovery if an attack occurs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-26680: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows Server 2019
Description
Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.
AI-Powered Analysis
Technical Analysis
CVE-2025-26680 is a high-severity vulnerability classified under CWE-400, indicating uncontrolled resource consumption, affecting Microsoft Windows Server 2019 (build 10.0.17763.0). The vulnerability exists in the Windows Standards-Based Storage Management Service, which is responsible for managing storage resources on Windows Server platforms. An unauthorized attacker can exploit this flaw remotely over a network without requiring any authentication or user interaction. By sending specially crafted requests to the vulnerable service, the attacker can cause excessive consumption of system resources such as CPU, memory, or disk I/O. This resource exhaustion leads to a denial-of-service (DoS) condition, rendering the affected server unresponsive or severely degraded in performance. The CVSS v3.1 base score of 7.5 reflects the high impact on availability (A:H) with no impact on confidentiality or integrity, and the attack vector is network-based with low attack complexity and no privileges or user interaction needed. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a significant risk for environments running Windows Server 2019, especially those exposed to untrusted networks. The lack of available patches at the time of publication increases the urgency for mitigation and monitoring.
Potential Impact
For European organizations, this vulnerability poses a substantial risk to critical infrastructure and enterprise environments relying on Windows Server 2019 for storage management and other server roles. A successful DoS attack could disrupt business operations, leading to downtime of essential services such as file sharing, database hosting, and application delivery. This disruption can affect sectors like finance, healthcare, manufacturing, and government services where availability is paramount. Additionally, the ability to exploit this vulnerability remotely without authentication increases the attack surface, especially for organizations with externally facing servers or insufficient network segmentation. The resulting service outages could lead to financial losses, reputational damage, and potential regulatory non-compliance under frameworks like GDPR if service availability impacts data processing commitments.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement immediate compensating controls. These include restricting network access to the Windows Standards-Based Storage Management Service by applying strict firewall rules and network segmentation to limit exposure to untrusted networks. Employ intrusion detection and prevention systems (IDS/IPS) to monitor for anomalous traffic patterns indicative of resource exhaustion attacks targeting this service. Administrators should also review and harden server configurations to minimize unnecessary service exposure and disable the Standards-Based Storage Management Service if it is not essential for operational needs. Regular monitoring of system resource utilization and establishing alerting thresholds can help detect early signs of exploitation attempts. Once a patch becomes available, prompt testing and deployment are critical. Additionally, maintaining up-to-date backups and incident response plans will aid in recovery if an attack occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-02-12T22:35:41.551Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aebb70
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 7/11/2025, 4:03:30 AM
Last updated: 8/13/2025, 1:06:46 AM
Views: 15
Related Threats
CVE-2025-2713: CWE-269 Improper Privilege Management in Google gVisor
MediumCVE-2025-8916: CWE-770 Allocation of Resources Without Limits or Throttling in Legion of the Bouncy Castle Inc. Bouncy Castle for Java
MediumCVE-2025-8914: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in WellChoose Organization Portal System
HighCVE-2025-8913: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in WellChoose Organization Portal System
CriticalCVE-2025-8912: CWE-36 Absolute Path Traversal in WellChoose Organization Portal System
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.