Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47978: CWE-125: Out-of-bounds Read in Microsoft Windows Server 2022

0
Medium
VulnerabilityCVE-2025-47978cvecve-2025-47978cwe-125
Published: Tue Jul 08 2025 (07/08/2025, 16:57:30 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows Server 2022

Description

Out-of-bounds read in Windows Kerberos allows an authorized attacker to deny service over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 10:06:56 UTC

Technical Analysis

CVE-2025-47978 is a vulnerability classified as CWE-125 (Out-of-bounds Read) affecting Microsoft Windows Server 2022, specifically within the Windows Kerberos authentication protocol implementation. The flaw arises from improper bounds checking during memory reads, allowing an attacker with authorized network access and limited privileges to read memory outside the intended buffer boundaries. This can lead to memory corruption that causes the Kerberos service to crash or become unstable, resulting in a denial of service (DoS) condition. The vulnerability does not allow for data leakage or privilege escalation but impacts system availability. The CVSS 3.1 base score is 6.5, indicating a medium severity level, with attack vector being network-based (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and unchanged scope (S:U). The exploitability is moderate since the attacker must have some level of access but can trigger the issue remotely without user interaction. No public exploits or patches are currently available, but the vulnerability is publicly disclosed and should be addressed promptly. The Kerberos protocol is critical for authentication in enterprise environments, so disruption can affect domain controllers and dependent services.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the availability of authentication services. Windows Server 2022 is widely used in enterprise and government environments across Europe, often as domain controllers handling Kerberos authentication. A successful DoS attack could disrupt user authentication, access to network resources, and critical business applications, leading to operational downtime and potential financial losses. Sectors such as finance, healthcare, public administration, and critical infrastructure that rely heavily on Windows authentication services are particularly vulnerable. While confidentiality and integrity are not directly impacted, the availability disruption could cascade into broader business continuity issues. The lack of known exploits reduces immediate risk, but the medium severity and ease of remote exploitation warrant proactive mitigation to prevent potential targeted attacks.

Mitigation Recommendations

Organizations should prioritize deploying official patches from Microsoft once released to address this vulnerability. Until patches are available, network segmentation and strict access controls should be enforced to limit exposure of Windows Server 2022 systems running Kerberos services. Monitoring Kerberos service logs and system stability can help detect early signs of exploitation attempts or crashes. Implementing rate limiting or network-level protections to restrict anomalous Kerberos traffic may reduce attack surface. Additionally, ensuring that only authorized and trusted users have network access privileges to these servers minimizes the risk of exploitation. Regular backups and incident response plans should be updated to handle potential DoS scenarios affecting authentication infrastructure. Coordination with Microsoft support and security advisories is recommended to stay informed about patch releases and exploit developments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-05-14T14:13:13.466Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686d50d36f40f0eb72f91b0b

Added to database: 7/8/2025, 5:09:39 PM

Last enriched: 2/14/2026, 10:06:56 AM

Last updated: 3/28/2026, 9:42:36 AM

Views: 77

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses