Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27479: CWE-410: Insufficient Resource Pool in Microsoft Windows Server 2012

0
High
VulnerabilityCVE-2025-27479cvecve-2025-27479cwe-410
Published: Tue Apr 08 2025 (04/08/2025, 17:23:20 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows Server 2012

Description

Insufficient resource pool in Windows Kerberos allows an unauthorized attacker to deny service over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 09:17:37 UTC

Technical Analysis

CVE-2025-27479 is a vulnerability classified under CWE-410 (Insufficient Resource Pool) affecting Microsoft Windows Server 2012, specifically version 6.2.9200.0. The flaw resides in the Windows Kerberos authentication service, where an insufficient allocation or management of resource pools can be exploited by an unauthenticated attacker over the network to cause a denial of service (DoS). The attacker can send crafted requests that exhaust the resource pool, leading to service unavailability without requiring any privileges or user interaction. The vulnerability has a CVSS v3.1 base score of 7.5, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is limited to availability (A:H), with no confidentiality or integrity impact. The scope is unchanged (S:U), meaning the vulnerability affects only the vulnerable component. The exploitability is rated as unproven but theoretically feasible (E:U), with an official remediation level of official fix pending (RL:O) and a confirmed report confidence (RC:C). No patches have been released yet, and no known exploits are reported in the wild. The vulnerability poses a risk to environments still running Windows Server 2012, which is often used in legacy or specialized infrastructure. The Kerberos service is critical for authentication in Windows domains, so disruption can cause widespread authentication failures and service outages. The vulnerability highlights the importance of resource management in authentication services and the risks posed by legacy systems without current support or patches.

Potential Impact

For European organizations, the primary impact is a denial of service on Windows Kerberos authentication services running on Windows Server 2012. This can lead to authentication failures across enterprise networks, preventing users and services from accessing resources, disrupting business operations, and potentially causing downtime in critical infrastructure. Sectors such as finance, healthcare, government, and manufacturing that rely on Windows Server 2012 for domain controllers or authentication services are particularly vulnerable. The lack of confidentiality or integrity impact means data breaches are unlikely, but operational availability is at significant risk. Organizations with legacy systems or slow upgrade cycles face increased exposure. The ease of exploitation without authentication or user interaction raises the risk of automated attacks or wormable scenarios if exploit code emerges. This could also affect cloud or hybrid environments where Windows Server 2012 instances are still in use. The absence of known exploits currently provides a window for proactive mitigation, but the threat landscape could evolve rapidly once exploit techniques are developed.

Mitigation Recommendations

1. Monitor network traffic and authentication service logs for unusual spikes or patterns that may indicate resource exhaustion attempts targeting Kerberos services. 2. Implement network-level protections such as rate limiting, firewall rules, or intrusion prevention systems to detect and block suspicious authentication requests. 3. Prioritize upgrading Windows Server 2012 systems to supported versions like Windows Server 2019 or later, which receive security updates and improved resource management. 4. If upgrading is not immediately feasible, isolate legacy servers from direct internet exposure and restrict access to trusted networks only. 5. Apply any interim mitigations or workarounds published by Microsoft once available, including configuration changes to resource allocation parameters if documented. 6. Conduct regular vulnerability assessments and penetration tests focusing on authentication services to identify potential exploitation attempts. 7. Maintain an incident response plan that includes procedures for handling authentication service outages and DoS attacks. 8. Engage with Microsoft support channels to receive timely updates on patch releases or advisories related to this vulnerability. 9. Consider deploying redundant authentication servers and failover mechanisms to minimize service disruption impact. 10. Educate IT staff about the risks associated with legacy systems and the importance of timely patching and upgrades.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-02-26T14:42:05.977Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebb9d

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/14/2026, 9:17:37 AM

Last updated: 3/26/2026, 11:09:18 AM

Views: 85

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses