Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27470: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows Server 2012 R2

0
High
VulnerabilityCVE-2025-27470cvecve-2025-27470cwe-400
Published: Tue Apr 08 2025 (04/08/2025, 17:23:15 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows Server 2012 R2

Description

Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 09:15:36 UTC

Technical Analysis

CVE-2025-27470 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting the Standards-Based Storage Management Service in Microsoft Windows Server 2012 R2 (version 6.3.9600.0). This service is responsible for managing storage resources using standards-based protocols. The flaw allows an unauthenticated attacker to send specially crafted network requests that cause the service to consume excessive system resources such as CPU, memory, or handles. This resource exhaustion can degrade system performance or cause the service or entire server to become unresponsive, resulting in a denial of service condition. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network, increasing its risk profile. The CVSS v3.1 score of 7.5 reflects a high severity due to the network attack vector, low attack complexity, and the complete impact on availability without affecting confidentiality or integrity. Although no public exploits have been reported yet and no official patches are available, the vulnerability is publicly disclosed and should be treated as a significant risk. The affected product, Windows Server 2012 R2, remains widely used in enterprise environments, especially in legacy systems and critical infrastructure. The lack of patches means organizations must rely on compensating controls until updates are released.

Potential Impact

For European organizations, the primary impact of CVE-2025-27470 is the potential for denial of service attacks that can disrupt critical business operations, especially in sectors relying on Windows Server 2012 R2 for storage management. This includes financial institutions, healthcare providers, government agencies, and industrial control systems. The unavailability of storage management services can lead to downtime, loss of productivity, and potential cascading failures in dependent applications and services. Since the vulnerability can be exploited remotely without authentication, attackers can launch DoS attacks from anywhere, increasing the threat landscape. The impact is heightened in environments where Windows Server 2012 R2 is still in active use without modern mitigations or where patching is delayed due to operational constraints. Disruptions in critical infrastructure could have broader societal and economic consequences. Additionally, the absence of confidentiality or integrity impact means data breaches are unlikely, but service reliability and availability are at significant risk.

Mitigation Recommendations

1. Implement network-level filtering to restrict access to the Standards-Based Storage Management Service ports only to trusted hosts and networks, using firewalls or network segmentation. 2. Monitor network traffic and system resource usage closely for unusual spikes or patterns indicative of resource exhaustion attacks. 3. Prioritize upgrading Windows Server 2012 R2 systems to supported versions with active security updates, as this version is nearing or past end-of-life status. 4. Where upgrades are not immediately feasible, isolate vulnerable servers from untrusted networks and limit exposure to reduce attack surface. 5. Employ intrusion detection/prevention systems (IDS/IPS) capable of detecting anomalous traffic targeting storage management services. 6. Develop and test incident response plans specifically for denial of service scenarios affecting storage services. 7. Stay informed about vendor advisories and apply patches promptly once available. 8. Consider deploying rate-limiting or connection throttling mechanisms on affected services to mitigate resource exhaustion attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-02-26T14:42:05.975Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebb8b

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/14/2026, 9:15:36 AM

Last updated: 3/25/2026, 7:05:10 AM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses