Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27474: CWE-908: Use of Uninitialized Resource in Microsoft Windows Server 2008 R2 Service Pack 1

0
Medium
VulnerabilityCVE-2025-27474cvecve-2025-27474cwe-908
Published: Tue Apr 08 2025 (04/08/2025, 17:23:17 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows Server 2008 R2 Service Pack 1

Description

Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 09:16:26 UTC

Technical Analysis

CVE-2025-27474 is a vulnerability identified in Microsoft Windows Server 2008 R2 Service Pack 1, specifically within the Routing and Remote Access Service (RRAS). The root cause is the use of an uninitialized resource, classified under CWE-908, which leads to unintended information disclosure over the network. This flaw allows an attacker without any privileges (PR:N) to remotely exploit the vulnerability over the network (AV:N) with low attack complexity (AC:L). However, exploitation requires user interaction (UI:R), such as convincing a user to initiate a connection or interaction that triggers the vulnerability. The vulnerability does not affect system integrity or availability but compromises confidentiality by leaking potentially sensitive data. The CVSS v3.1 base score is 6.5, indicating medium severity, with a vector highlighting network attack vector, low complexity, no privileges required, user interaction needed, and high confidentiality impact. No known exploits have been observed in the wild, and no official patches have been released at the time of publication. The affected version is Windows Server 2008 R2 SP1 (version 6.1.7601.0), a legacy operating system still in use in some environments. The vulnerability poses a risk primarily to organizations that have RRAS enabled and exposed to untrusted networks, as attackers could leverage this flaw to gain unauthorized access to sensitive information transmitted or processed by RRAS.

Potential Impact

For European organizations, the primary impact of CVE-2025-27474 is the unauthorized disclosure of sensitive information, which could include network configuration details, routing information, or other data handled by RRAS. This information leakage could facilitate further targeted attacks, such as reconnaissance or lateral movement within networks. Organizations in sectors such as telecommunications, government, critical infrastructure, and enterprises relying on legacy Windows Server 2008 R2 deployments are particularly at risk. The confidentiality breach could lead to compliance issues under GDPR if personal or sensitive data is exposed. Although the vulnerability does not affect system integrity or availability, the loss of confidentiality can undermine trust and operational security. Since Windows Server 2008 R2 is an older platform, many organizations may have limited monitoring or patching capabilities, increasing exposure. The requirement for user interaction somewhat limits the attack surface but does not eliminate risk, especially in environments with remote access users or partners. The absence of known exploits in the wild provides a window for proactive mitigation before active exploitation occurs.

Mitigation Recommendations

To mitigate CVE-2025-27474 effectively, European organizations should first assess whether RRAS is necessary in their environment; if not, disable the service entirely to eliminate the attack vector. For environments requiring RRAS, restrict network access to RRAS endpoints using firewalls and network segmentation, limiting exposure to trusted hosts only. Implement strict access controls and monitor RRAS logs for unusual activity or connection attempts. Employ network intrusion detection systems (NIDS) to detect anomalous traffic patterns that may indicate exploitation attempts. Since no official patch is currently available, consider applying vendor-recommended workarounds or temporary mitigations such as disabling specific RRAS features that handle the uninitialized resource. Educate users about the risk of interacting with unsolicited network prompts or connections that could trigger the vulnerability. Plan and prioritize migration from Windows Server 2008 R2 to supported versions to reduce exposure to legacy vulnerabilities. Maintain up-to-date backups and incident response plans tailored to information disclosure incidents. Engage with Microsoft security advisories for updates on patches or further guidance.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-02-26T14:42:05.976Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebb93

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/14/2026, 9:16:26 AM

Last updated: 3/24/2026, 4:23:00 PM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses