Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21207: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-21207cvecve-2025-21207cwe-400
Published: Tue Jan 14 2025 (01/14/2025, 18:04:19 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Connected Devices Platform Service (Cdpsvc) Denial of Service Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 07:58:45 UTC

Technical Analysis

CVE-2025-21207 is a denial of service (DoS) vulnerability in the Windows Connected Devices Platform Service (Cdpsvc) component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability is classified under CWE-400, indicating uncontrolled resource consumption. An attacker can remotely exploit this flaw without requiring any authentication or user interaction by sending specially crafted requests to the Cdpsvc, causing the service to consume excessive system resources such as CPU or memory. This resource exhaustion can lead to system instability or crash, effectively denying legitimate users access to the affected system or service. The vulnerability has a CVSS v3.1 base score of 7.5 (high), reflecting its network attack vector, low attack complexity, no privileges or user interaction required, and a significant impact on availability. No known exploits have been reported in the wild, and as of the published date, no official patches have been released by Microsoft. The affected product is specifically Windows 10 Version 1809, which is an older release that may still be in use in some enterprise environments. The vulnerability does not affect confidentiality or integrity but poses a significant risk to system availability, especially in environments where uptime is critical. The lack of patches means organizations must rely on mitigation strategies until an official fix is available.

Potential Impact

For European organizations, this vulnerability poses a significant risk to operational continuity, particularly for those still running Windows 10 Version 1809 in production environments. The denial of service can disrupt business-critical applications and services, leading to potential downtime and productivity loss. Sectors such as finance, healthcare, manufacturing, and government agencies that rely on stable Windows infrastructure could face operational disruptions. The vulnerability's remote exploitation capability without authentication increases the attack surface, making it easier for threat actors to target exposed systems over the network. Although no data breach or integrity compromise is involved, the availability impact can indirectly affect confidentiality and integrity by interrupting security monitoring or incident response capabilities. Organizations with legacy systems or delayed patching cycles are at higher risk. The absence of known exploits in the wild currently reduces immediate threat levels but does not eliminate the risk of future exploitation. The impact is exacerbated in environments with inadequate network segmentation or weak perimeter defenses.

Mitigation Recommendations

1. Restrict network access to the Windows Connected Devices Platform Service (Cdpsvc) by implementing strict firewall rules that block unsolicited inbound traffic to ports and protocols used by this service. 2. Employ network segmentation to isolate legacy Windows 10 Version 1809 systems from critical infrastructure and sensitive network segments. 3. Monitor network traffic and system resource usage for unusual spikes that may indicate exploitation attempts targeting Cdpsvc. 4. Disable or limit the use of the Connected Devices Platform Service if it is not required for business operations, reducing the attack surface. 5. Prioritize upgrading affected systems to a supported and patched version of Windows 10 or later, as Windows 10 Version 1809 is out of mainstream support and unlikely to receive timely patches. 6. Implement intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect anomalous traffic patterns related to this vulnerability once available. 7. Maintain up-to-date backups and incident response plans to quickly recover from potential denial of service incidents. 8. Stay informed on Microsoft advisories for any forthcoming patches or updates addressing this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-05T21:43:30.768Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0bd4c9ed239a66badea52

Added to database: 9/9/2025, 11:50:36 PM

Last enriched: 2/14/2026, 7:58:45 AM

Last updated: 3/25/2026, 1:33:11 AM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses