CVE-2025-26680

7.5 HIGH

📋 TL;DR

This vulnerability in Windows Standards-Based Storage Management Service allows unauthorized attackers to cause denial of service by consuming system resources over a network. It affects Windows systems with this service enabled, potentially disrupting storage management functionality.

💻 Affected Systems

Products:
  • Windows Standards-Based Storage Management Service
Versions: Specific Windows versions as detailed in Microsoft advisory
Operating Systems: Windows Server, Windows Client versions with the service
Default Config Vulnerable: ⚠️ Yes
Notes: Systems with Windows Standards-Based Storage Management Service enabled and network-accessible are vulnerable. The service may not be enabled by default on all Windows editions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption of Windows Standards-Based Storage Management Service, potentially affecting storage operations and management capabilities across the network.

🟠

Likely Case

Temporary service degradation or unavailability of storage management functions until resource consumption subsides or system is restarted.

🟢

If Mitigated

Minimal impact with proper network segmentation and access controls limiting exposure to the vulnerable service.

🌐 Internet-Facing: MEDIUM - While the service is typically internal, misconfigured systems or VPN-connected endpoints could be exposed.
🏢 Internal Only: HIGH - The service is commonly accessible on internal networks, allowing lateral movement and disruption within enterprise environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The CWE-400 (Uncontrolled Resource Consumption) suggests relatively straightforward exploitation by sending crafted requests to exhaust service resources.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Microsoft Security Update for specific KB numbers

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26680

Restart Required: Yes

Instructions:

1. Apply the latest Windows security updates from Microsoft. 2. Restart affected systems to complete the patch installation. 3. Verify the service is running the patched version.

🔧 Temporary Workarounds

Disable Windows Standards-Based Storage Management Service

windows

Temporarily disable the vulnerable service if not required for operations

sc config WSSMService start= disabled
sc stop WSSMService

Restrict Network Access

windows

Use Windows Firewall to block inbound connections to the service port

netsh advfirewall firewall add rule name="Block WSSM" dir=in action=block protocol=TCP localport=[PORT]

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate systems running the vulnerable service
  • Deploy network-based intrusion prevention systems to detect and block resource exhaustion attempts

🔍 How to Verify

Check if Vulnerable:

Check if Windows Standards-Based Storage Management Service is enabled and running: sc query WSSMService

Check Version:

wmic service where name="WSSMService" get name,pathname

Verify Fix Applied:

Verify Windows Update history contains the relevant security update KB number and check service version

📡 Detection & Monitoring

Log Indicators:

  • Unusual volume of requests to WSSMService in Windows Event Logs
  • Service crash or restart events
  • High resource consumption alerts

Network Indicators:

  • Abnormal traffic patterns to service port (typically 5985/5986 for WS-Management)
  • Multiple connection attempts from single sources

SIEM Query:

EventID=7036 AND ServiceName="WSSMService" | stats count by _time

🔗 References

📤 Share & Export