Skip to main content

CVE-2025-49671: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Windows Server 2019

Medium
VulnerabilityCVE-2025-49671cvecve-2025-49671cwe-200cwe-125
Published: Tue Jul 08 2025 (07/08/2025, 16:57:10 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows Server 2019

Description

Exposure of sensitive information to an unauthorized actor in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.

AI-Powered Analysis

AILast updated: 08/26/2025, 00:58:49 UTC

Technical Analysis

CVE-2025-49671 is a vulnerability identified in Microsoft Windows Server 2019, specifically affecting the Routing and Remote Access Service (RRAS). This vulnerability is classified under CWE-200, which pertains to the exposure of sensitive information to unauthorized actors. The flaw allows an attacker to disclose sensitive information over a network without requiring any privileges or authentication, although user interaction is necessary to exploit it. The vulnerability exists in version 10.0.17763.0 of Windows Server 2019. The CVSS v3.1 base score is 6.5, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), but requires user interaction (UI:R). The scope is unchanged (S:U), and the impact is high on confidentiality (C:H), with no impact on integrity or availability. The vulnerability does not currently have known exploits in the wild, and no patches have been linked yet. The exposure of sensitive information could involve leakage of configuration details, credentials, or other critical data managed by RRAS, which is used to provide routing and remote access capabilities in Windows Server environments. This information disclosure could facilitate further attacks by providing attackers with insights into network topology or credentials.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive network information managed by Windows Server 2019 RRAS deployments. Many enterprises, government agencies, and service providers in Europe rely on Windows Server for critical infrastructure and remote access services. Exposure of sensitive information could lead to targeted attacks such as lateral movement, privilege escalation, or network reconnaissance by threat actors. Given that no authentication is required, attackers can potentially exploit this vulnerability from remote locations, increasing the attack surface. The requirement for user interaction somewhat limits the ease of exploitation but does not eliminate risk, especially in environments where social engineering or phishing attacks are common. The absence of known exploits in the wild reduces immediate risk but also means organizations should proactively address the vulnerability before it is weaponized. Confidentiality breaches could have regulatory implications under GDPR, especially if personal or sensitive data is indirectly exposed through this flaw.

Mitigation Recommendations

Organizations should prioritize the following mitigation steps: 1) Monitor Microsoft security advisories closely for the release of official patches or updates addressing CVE-2025-49671 and apply them promptly. 2) Restrict network access to RRAS services by implementing strict firewall rules and network segmentation to limit exposure to untrusted networks. 3) Employ multi-factor authentication and robust user training to reduce the risk of successful user interaction exploitation vectors such as phishing. 4) Conduct regular audits of RRAS configurations and logs to detect unusual access patterns or information disclosure attempts. 5) Consider disabling RRAS services if they are not essential to reduce the attack surface. 6) Use network intrusion detection systems (NIDS) with updated signatures to identify potential exploitation attempts. 7) Implement strict least privilege principles for accounts managing RRAS to minimize potential damage from information disclosure. These steps go beyond generic advice by focusing on network-level controls, user behavior, and proactive monitoring tailored to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-06-09T17:28:52.663Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686d50d56f40f0eb72f91be2

Added to database: 7/8/2025, 5:09:41 PM

Last enriched: 8/26/2025, 12:58:49 AM

Last updated: 9/27/2025, 12:00:38 AM

Views: 29

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats