Skip to main content

CVE-2025-21207: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2025-21207cvecve-2025-21207cwe-400
Published: Tue Jan 14 2025 (01/14/2025, 18:04:19 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Connected Devices Platform Service (Cdpsvc) Denial of Service Vulnerability

AI-Powered Analysis

AILast updated: 09/10/2025, 01:51:08 UTC

Technical Analysis

CVE-2025-21207 is a high-severity vulnerability affecting Microsoft Windows 10 Version 1809, specifically targeting the Windows Connected Devices Platform Service (Cdpsvc). This vulnerability is categorized under CWE-400, which denotes uncontrolled resource consumption, commonly known as a denial of service (DoS) condition. The flaw allows an unauthenticated attacker to remotely trigger excessive resource usage in the Cdpsvc component without requiring user interaction or privileges. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The vulnerability impacts availability (A:H) but does not affect confidentiality or integrity. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component or system. The CVSS v3.1 base score is 7.5, indicating a high severity level. Although no known exploits are currently reported in the wild, the vulnerability's characteristics suggest it could be weaponized to cause service outages or system instability by exhausting system resources such as CPU, memory, or handles through malformed or excessive network requests to the Cdpsvc. The Windows Connected Devices Platform Service is responsible for managing connected devices and their interactions, so disruption could affect device connectivity and related functionalities. The affected version, Windows 10 1809 (build 10.0.17763.0), is an older release, but still in use in some enterprise environments. No official patches or mitigations have been linked yet, emphasizing the need for proactive defensive measures.

Potential Impact

For European organizations, this vulnerability poses a significant risk to operational continuity, especially for those relying on Windows 10 Version 1809 in their infrastructure. The denial of service condition could disrupt critical device connectivity services, impacting workflows that depend on connected peripherals or IoT devices managed via Cdpsvc. This could lead to downtime, reduced productivity, and potential cascading failures in environments where device communication is essential, such as manufacturing, healthcare, or logistics sectors. Additionally, the vulnerability's network-based exploitation vector means that attackers could launch remote DoS attacks without authentication, increasing the threat surface. Given the high severity and ease of exploitation, organizations could face targeted disruptions or opportunistic attacks, particularly in sectors with high device interconnectivity. The lack of known exploits currently provides a window for mitigation before active exploitation emerges.

Mitigation Recommendations

1. Upgrade and Patch: Although no official patch is currently linked, organizations should monitor Microsoft security advisories closely and apply patches as soon as they become available. 2. Version Upgrade: Consider upgrading systems from Windows 10 Version 1809 to a more recent, supported Windows version where this vulnerability is not present. 3. Network Controls: Implement network-level filtering to restrict access to the Windows Connected Devices Platform Service ports and protocols, limiting exposure to untrusted networks. 4. Resource Monitoring: Deploy monitoring tools to detect unusual resource consumption patterns on endpoints running Windows 10 1809, enabling early detection of potential exploitation attempts. 5. Segmentation: Isolate critical systems and device management services from general network traffic to reduce attack surface. 6. Incident Response Preparedness: Develop and test response plans for denial of service scenarios affecting device connectivity services to minimize downtime. 7. Disable Cdpsvc if feasible: For environments where connected device functionality is not required, consider disabling the Windows Connected Devices Platform Service to eliminate the attack vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-05T21:43:30.768Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0bd4c9ed239a66badea52

Added to database: 9/9/2025, 11:50:36 PM

Last enriched: 9/10/2025, 1:51:08 AM

Last updated: 9/10/2025, 4:38:00 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats