Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21218: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows Server 2012

0
High
VulnerabilityCVE-2025-21218cvecve-2025-21218cwe-400
Published: Tue Jan 14 2025 (01/14/2025, 18:04:46 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows Server 2012

Description

Windows Kerberos Denial of Service Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 08:00:17 UTC

Technical Analysis

CVE-2025-21218 is a vulnerability classified under CWE-400, indicating uncontrolled resource consumption, found in Microsoft Windows Server 2012 (version 6.2.9200.0). The flaw resides within the Windows Kerberos authentication mechanism, a core component responsible for secure identity verification in enterprise environments. An attacker can exploit this vulnerability remotely without requiring any privileges or user interaction, making it highly accessible. The exploitation triggers excessive resource consumption, such as CPU or memory exhaustion, leading to a denial of service (DoS) condition that disrupts the availability of the affected server. The CVSS v3.1 base score of 7.5 reflects a high severity level, emphasizing the potential impact on availability (A:H) while confidentiality and integrity remain unaffected (C:N/I:N). The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The vulnerability was published on January 14, 2025, with no known exploits in the wild at the time of reporting and no patches currently available. Given the critical role of Kerberos in domain authentication and access control, exploitation could severely disrupt enterprise operations relying on Windows Server 2012, particularly in environments where this legacy system remains in use.

Potential Impact

For European organizations, the primary impact of CVE-2025-21218 is the potential for denial of service attacks against Windows Server 2012 systems running Kerberos authentication services. This can lead to authentication failures, preventing users from accessing network resources, applications, and services dependent on Active Directory. Critical sectors such as finance, healthcare, government, and telecommunications, which often rely on legacy Windows Server deployments, may experience operational disruptions, loss of productivity, and potential cascading effects on dependent systems. The unavailability of authentication services can also hinder incident response and recovery efforts during ongoing cyber incidents. Additionally, organizations with regulatory compliance obligations (e.g., GDPR) may face increased scrutiny if service interruptions affect data access or availability. Although the vulnerability does not compromise confidentiality or integrity, the availability impact alone can cause significant business and reputational damage.

Mitigation Recommendations

Since no official patch is currently available, European organizations should implement the following specific mitigation strategies: 1) Isolate Windows Server 2012 systems running Kerberos services from untrusted networks using network segmentation and strict firewall rules to limit exposure to potential attackers. 2) Deploy intrusion detection and prevention systems (IDS/IPS) with signatures or anomaly detection tuned to identify unusual Kerberos traffic patterns indicative of resource exhaustion attempts. 3) Monitor system resource utilization closely on affected servers to detect early signs of exploitation, enabling rapid response and mitigation. 4) Consider upgrading or migrating authentication services to supported Windows Server versions with active security updates to eliminate exposure to this legacy vulnerability. 5) Implement rate limiting or throttling mechanisms on Kerberos requests where feasible to reduce the risk of resource exhaustion. 6) Maintain robust incident response plans that include procedures for handling authentication service outages. 7) Engage with Microsoft support channels for any available workarounds or upcoming patches and apply them promptly once released.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-05T21:43:30.771Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0bd4d9ed239a66badea77

Added to database: 9/9/2025, 11:50:37 PM

Last enriched: 2/14/2026, 8:00:17 AM

Last updated: 3/24/2026, 8:19:14 AM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses