Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21179: CWE-125: Out-of-bounds Read in Microsoft Windows 11 Version 24H2

0
Medium
VulnerabilityCVE-2025-21179cvecve-2025-21179cwe-125
Published: Tue Feb 11 2025 (02/11/2025, 17:58:40 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 11 Version 24H2

Description

DHCP Client Service Denial of Service Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 08:35:06 UTC

Technical Analysis

CVE-2025-21179 is a medium severity vulnerability classified as CWE-125 (Out-of-bounds Read) affecting the DHCP Client Service in Microsoft Windows 11 Version 24H2 (build 10.0.26100.0). The vulnerability arises when the DHCP Client improperly handles certain DHCP packets, leading to an out-of-bounds memory read. This flaw can be exploited remotely by an unauthenticated attacker with network access who can send crafted DHCP responses or packets to the target system. Successful exploitation results in a denial of service condition by crashing the DHCP Client service, which may cause loss of network connectivity or system instability. The CVSS v3.1 vector indicates the attack requires network access (AV:A), high attack complexity (AC:H), no privileges required (PR:N), and user interaction (UI:R). The scope remains unchanged (S:U), and the impact is limited to availability (A:H) with no confidentiality or integrity impact. No known exploits have been reported in the wild, and no official patches have been released at the time of publication. The vulnerability is particularly relevant in environments where DHCP is used extensively, such as enterprise networks and managed service providers. The lack of confidentiality or integrity impact reduces the risk of data breach, but the availability impact can disrupt critical network services.

Potential Impact

For European organizations, this vulnerability poses a risk of network service disruption due to DHCP Client service crashes on Windows 11 24H2 systems. Enterprises relying on DHCP for IP address management may experience intermittent or prolonged loss of network connectivity, affecting productivity and availability of critical applications. Sectors such as finance, healthcare, manufacturing, and government that depend on stable network infrastructure could face operational challenges. The medium severity and requirement for user interaction reduce the likelihood of widespread exploitation, but targeted attacks or phishing campaigns could trigger the vulnerability. Additionally, organizations with remote or hybrid workforces using Windows 11 devices connected to untrusted networks may be more exposed. The absence of known exploits provides a window for proactive mitigation, but the lack of patches necessitates interim defensive measures to maintain network stability.

Mitigation Recommendations

1. Implement network segmentation to isolate DHCP traffic and restrict DHCP server responses to trusted sources only. 2. Use firewall rules to block unauthorized DHCP packets from untrusted or external networks. 3. Monitor DHCP Client service stability and network logs for unusual crashes or DHCP-related errors. 4. Educate users to avoid interacting with suspicious network prompts or connections that could trigger the vulnerability. 5. Employ endpoint detection and response (EDR) tools to detect anomalous DHCP client behavior. 6. Maintain up-to-date backups and incident response plans to quickly recover from potential service disruptions. 7. Stay alert for official patches or advisories from Microsoft and apply them promptly once available. 8. Consider temporary disabling or limiting DHCP Client service usage in high-risk environments if feasible. 9. Use network access control (NAC) solutions to enforce device compliance and restrict network access for untrusted devices. 10. Collaborate with network administrators to ensure DHCP infrastructure is hardened and monitored continuously.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2024-12-05T21:43:30.761Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69432efa058703ef3fc97f45

Added to database: 12/17/2025, 10:30:18 PM

Last enriched: 2/14/2026, 8:35:06 AM

Last updated: 3/25/2026, 3:03:13 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses