Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26680: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows Server 2012 R2

0
High
VulnerabilityCVE-2025-26680cvecve-2025-26680cwe-400
Published: Tue Apr 08 2025 (04/08/2025, 17:23:11 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows Server 2012 R2

Description

Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 09:13:56 UTC

Technical Analysis

CVE-2025-26680 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) found in the Standards-Based Storage Management Service of Microsoft Windows Server 2012 R2 (version 6.3.9600.0). This flaw allows an unauthenticated attacker to send specially crafted requests over the network to the affected service, causing it to consume excessive system resources such as CPU, memory, or network bandwidth. The result is a denial of service condition where legitimate users and services cannot access the server or its storage management functionalities. The vulnerability is notable because it requires no authentication or user interaction, increasing the attack surface and ease of exploitation. The CVSS v3.1 base score is 7.5 (high), reflecting the network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact is limited to availability, with no direct compromise of confidentiality or integrity. No patches have been linked yet, and no exploits are known in the wild, but the vulnerability was publicly disclosed on April 8, 2025. Given Windows Server 2012 R2's age, many organizations may not have migrated to newer versions, leaving them exposed. The Standards-Based Storage Management Service is critical for managing storage resources, so disruption can affect data availability and operational continuity.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the availability of critical storage management services on Windows Server 2012 R2 systems. Industries such as finance, healthcare, manufacturing, and public sector entities that rely on legacy Microsoft server infrastructure could face service outages, impacting business continuity and potentially causing data access delays. The denial of service could disrupt internal operations and external customer-facing services, leading to financial losses and reputational damage. Since exploitation requires no authentication, attackers can launch attacks remotely without insider access, increasing the threat level. Organizations with insufficient network segmentation or exposure of the vulnerable service to untrusted networks are particularly at risk. The lack of known exploits currently reduces immediate risk but does not eliminate the potential for future attacks, especially as exploit code may be developed following public disclosure.

Mitigation Recommendations

1. Monitor Microsoft security advisories closely and apply any patches or updates addressing CVE-2025-26680 as soon as they become available. 2. Until patches are released, restrict network access to the Standards-Based Storage Management Service using firewalls or network segmentation to limit exposure to trusted management networks only. 3. Disable or uninstall the Standards-Based Storage Management Service if it is not required for operational purposes to eliminate the attack surface. 4. Implement intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection rules targeting unusual traffic patterns to the affected service. 5. Conduct regular resource usage monitoring on Windows Server 2012 R2 hosts to detect abnormal spikes that could indicate exploitation attempts. 6. Plan and accelerate migration from Windows Server 2012 R2 to supported versions with ongoing security updates to reduce legacy exposure. 7. Employ network-level rate limiting to mitigate potential resource exhaustion attacks. 8. Review and tighten access control policies for management services to minimize unnecessary exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-02-12T22:35:41.551Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebb70

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/14/2026, 9:13:56 AM

Last updated: 3/27/2026, 8:44:50 AM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses