Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-30394: CWE-591: Sensitive Data Storage in Improperly Locked Memory in Microsoft Windows Server 2019

0
Medium
VulnerabilityCVE-2025-30394cvecve-2025-30394cwe-591
Published: Tue May 13 2025 (05/13/2025, 16:58:49 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows Server 2019

Description

Sensitive data storage in improperly locked memory in Remote Desktop Gateway Service allows an unauthorized attacker to deny service over a network.

AI-Powered Analysis

AILast updated: 09/10/2025, 03:25:55 UTC

Technical Analysis

CVE-2025-30394 is a medium-severity vulnerability identified in Microsoft Windows Server 2019, specifically affecting version 10.0.17763.0. The vulnerability is categorized under CWE-591, which pertains to sensitive data storage in improperly locked memory. The issue resides within the Remote Desktop Gateway Service, a component that facilitates secure remote connections to internal network resources. Improper locking of memory means that sensitive data handled by this service is not adequately protected against unauthorized access or leakage in memory. Although the vulnerability itself does not directly compromise confidentiality or integrity, it allows an unauthorized attacker to cause a denial of service (DoS) over the network. The CVSS v3.1 score is 5.9 (medium), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), but has high attack complexity (AC:H). The impact is limited to availability (A:H), with no impact on confidentiality or integrity. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in March 2025 and published in May 2025, indicating recent discovery and disclosure. The Remote Desktop Gateway Service is critical in enterprise environments for secure remote access, and disruption can affect business continuity and remote workforce operations.

Potential Impact

For European organizations, the impact of this vulnerability primarily concerns availability disruption of Remote Desktop Gateway Services. Organizations relying heavily on Windows Server 2019 for remote access, especially those with remote or hybrid workforce models, may experience service outages or degraded access capabilities if exploited. This can lead to operational downtime, reduced productivity, and potential cascading effects on dependent services. While no direct data breach or integrity compromise is indicated, denial of service attacks can be leveraged as part of multi-stage attacks or to distract security teams. Critical infrastructure, financial institutions, healthcare providers, and government agencies in Europe that depend on secure remote access could face significant operational risks. The medium severity suggests that while the threat is not immediately critical, it requires timely attention to prevent disruption, especially in sectors where availability is paramount.

Mitigation Recommendations

Given the absence of an official patch link, European organizations should implement the following specific mitigations: 1) Restrict network exposure of the Remote Desktop Gateway Service by limiting access to trusted IP ranges and enforcing strict firewall rules. 2) Employ network-level authentication and multi-factor authentication to reduce unauthorized access attempts. 3) Monitor Remote Desktop Gateway logs and network traffic for unusual patterns indicative of DoS attempts or memory exploitation. 4) Apply system hardening best practices, including disabling unnecessary services and ensuring Windows Server 2019 is fully updated with the latest cumulative security updates. 5) Consider deploying network-based DoS protection solutions such as intrusion prevention systems (IPS) and rate limiting to mitigate potential attack traffic. 6) Prepare incident response plans specifically addressing availability disruptions of remote access services. 7) Once Microsoft releases an official patch, prioritize its deployment in all affected environments. These targeted actions go beyond generic advice by focusing on access control, monitoring, and network protections tailored to the Remote Desktop Gateway Service context.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-03-21T19:09:29.815Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aeba00

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 9/10/2025, 3:25:55 AM

Last updated: 10/7/2025, 1:44:50 PM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats