CVE-2025-49717
Published: 08 July 2025
Summary
CVE-2025-49717 is a high-severity Heap-based Buffer Overflow (CWE-122) vulnerability in Microsoft Sql Server 2019. Its CVSS base score is 8.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 39.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely remediation of the specific heap-based buffer overflow vulnerability in SQL Server through vendor patches.
Implements memory protection mechanisms such as heap canaries, ASLR, and DEP to directly mitigate heap-based buffer overflow exploits leading to code execution.
Validates network inputs to SQL Server to prevent malformed data from triggering the heap buffer overflow.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Network-accessible authenticated heap buffer overflow enabling arbitrary code execution on SQL Server directly maps to remote service/application exploitation and privilege escalation.
NVD Description
Heap-based buffer overflow in SQL Server allows an authorized attacker to execute code over a network.
Deeper analysisAI
CVE-2025-49717 is a heap-based buffer overflow vulnerability, classified under CWE-122, affecting Microsoft SQL Server. Published on 2025-07-08, it carries a CVSS v3.1 base score of 8.5 (AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H), indicating high severity with network accessibility, high attack complexity, and low privilege requirements.
An authorized attacker with low privileges (PR:L) can exploit this vulnerability over the network without user interaction. Successful exploitation allows arbitrary code execution, leading to high impacts on confidentiality, integrity, and availability, compounded by the changed scope (S:C).
The Microsoft Security Response Center advisory provides details on mitigation and patches at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49717.
Details
- CWE(s)