Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-29808: CWE-1240: Use of a Cryptographic Primitive with a Risky Implementation in Microsoft Windows Server 2022

0
Medium
VulnerabilityCVE-2025-29808cvecve-2025-29808cwe-1240
Published: Tue Apr 08 2025 (04/08/2025, 17:24:16 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows Server 2022

Description

Use of a cryptographic primitive with a risky implementation in Windows Cryptographic Services allows an authorized attacker to disclose information locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 09:28:17 UTC

Technical Analysis

CVE-2025-29808 is a vulnerability categorized under CWE-1240, indicating the use of a cryptographic primitive with a risky implementation within Microsoft Windows Server 2022's Cryptographic Services. This flaw allows an attacker with authorized local access to the affected system (Windows Server 2022 version 10.0.20348.0) to disclose sensitive information. The vulnerability does not require user interaction and does not affect the integrity or availability of the system, focusing solely on confidentiality. The CVSS 3.1 base score is 5.5 (medium), reflecting the local attack vector (AV:L), low attack complexity (AC:L), and the need for privileges (PR:L). The scope remains unchanged (S:U), and the impact is high on confidentiality (C:H) but none on integrity or availability. No known exploits are currently reported in the wild, and no patches have been released at the time of publication. The risky cryptographic primitive usage could potentially expose cryptographic keys or sensitive data processed by the cryptographic services, which could be leveraged for further attacks or data breaches if exploited. The vulnerability's exploitation requires local access with some privileges, limiting remote exploitation possibilities but still posing a threat in environments where multiple users have local access or where attackers have gained footholds through other means.

Potential Impact

For European organizations, the primary impact of CVE-2025-29808 is the potential unauthorized disclosure of sensitive information on Windows Server 2022 systems. This could include cryptographic keys, credentials, or other protected data handled by the cryptographic services. Such information disclosure can undermine confidentiality, potentially enabling further lateral movement or privilege escalation within the network. Organizations with multi-tenant environments, shared hosting, or those that allow multiple administrators or users local access are at higher risk. The vulnerability does not affect system integrity or availability, so operational disruption is unlikely. However, the breach of confidentiality could lead to compliance issues under GDPR and other data protection regulations, resulting in legal and reputational damage. Since exploitation requires local privileges, the risk is mitigated somewhat by strong internal access controls, but insider threats or attackers who have already compromised lower-level accounts could exploit this vulnerability to escalate their access or extract sensitive data.

Mitigation Recommendations

1. Enforce strict local access controls and limit administrative privileges to only trusted personnel to reduce the risk of local exploitation. 2. Implement robust monitoring and auditing of local access and cryptographic service usage to detect suspicious activities early. 3. Use endpoint detection and response (EDR) tools to identify anomalous behavior indicative of exploitation attempts. 4. Apply the official security patch from Microsoft promptly once it becomes available to remediate the vulnerability. 5. Consider network segmentation to isolate critical servers and limit lateral movement opportunities for attackers with local access. 6. Regularly review and harden cryptographic configurations and policies to minimize exposure. 7. Educate system administrators and users about the risks of privilege misuse and the importance of secure credential management. 8. Employ multi-factor authentication for local administrative accounts where possible to further reduce risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-03-11T18:19:40.248Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebc36

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/14/2026, 9:28:17 AM

Last updated: 3/27/2026, 10:13:38 AM

Views: 84

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses