Skip to main content

CVE-2025-21251: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2025-21251cvecve-2025-21251cwe-400
Published: Tue Jan 14 2025 (01/14/2025, 18:03:34 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability

AI-Powered Analysis

AILast updated: 09/10/2025, 01:35:26 UTC

Technical Analysis

CVE-2025-21251 is a high-severity vulnerability affecting Microsoft Windows 10 Version 1809, specifically targeting the Microsoft Message Queuing (MSMQ) component. The vulnerability is categorized under CWE-400, which relates to uncontrolled resource consumption, commonly known as a denial of service (DoS) condition. MSMQ is a messaging protocol that allows applications running on separate servers/processes to communicate asynchronously, widely used in enterprise environments for reliable message delivery. This vulnerability allows an unauthenticated attacker to remotely trigger excessive resource consumption on the affected system without requiring user interaction. The CVSS 3.1 base score of 7.5 reflects a high impact primarily on availability (A:H), with no impact on confidentiality or integrity. The attack vector is network-based (AV:N), requiring no privileges (PR:N) or user interaction (UI:N), making exploitation feasible over the network by any remote attacker. The vulnerability is present in Windows 10 Version 1809 build 10.0.17763.0, an older but still in-use version of Windows 10. No known exploits are reported in the wild yet, and no official patches or mitigations have been linked at the time of publication. The uncontrolled resource consumption could lead to system slowdown, service outages, or crashes, disrupting business-critical messaging services that rely on MSMQ. Given MSMQ’s role in enterprise messaging, this vulnerability could be leveraged to cause denial of service conditions in environments where Windows 10 1809 is deployed, potentially affecting internal communications and automated workflows.

Potential Impact

For European organizations, the impact of CVE-2025-21251 could be significant, especially for those relying on legacy Windows 10 1809 systems and MSMQ for internal messaging and workflow automation. Denial of service attacks exploiting this vulnerability could disrupt business operations, causing downtime in critical applications that depend on MSMQ for message delivery. This could affect sectors such as finance, manufacturing, healthcare, and government services where reliable messaging is essential. Additionally, the lack of required privileges and user interaction lowers the barrier for attackers, increasing the risk of widespread disruption. Organizations with limited patch management capabilities or those running unsupported or end-of-life systems are particularly vulnerable. The disruption of MSMQ services could also impact compliance with service-level agreements and regulatory requirements related to availability and operational continuity. While no data confidentiality or integrity impact is noted, the availability impact alone can cause significant operational and financial damage.

Mitigation Recommendations

Given the absence of an official patch at the time of this report, European organizations should take immediate steps to mitigate the risk: 1) Identify and inventory all systems running Windows 10 Version 1809, particularly those utilizing MSMQ. 2) Where possible, upgrade affected systems to a supported and patched Windows version that addresses this vulnerability. 3) Implement network-level controls such as firewall rules to restrict access to MSMQ ports (default TCP 1801) from untrusted or external networks, limiting exposure to potential attackers. 4) Monitor network traffic and system logs for unusual MSMQ activity indicative of resource exhaustion attempts. 5) Employ rate limiting or traffic shaping on MSMQ-related traffic to reduce the risk of resource exhaustion. 6) Consider disabling MSMQ on systems where it is not required to eliminate the attack surface. 7) Prepare incident response plans to quickly address potential denial of service incidents related to MSMQ. 8) Stay updated with Microsoft advisories for the release of patches or workarounds and apply them promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-10T23:54:12.930Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0bd4e9ed239a66badead0

Added to database: 9/9/2025, 11:50:38 PM

Last enriched: 9/10/2025, 1:35:26 AM

Last updated: 9/10/2025, 4:07:21 AM

Views: 1

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats