Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21251: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1507

0
High
VulnerabilityCVE-2025-21251cvecve-2025-21251cwe-400
Published: Tue Jan 14 2025 (01/14/2025, 18:03:34 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 08:07:19 UTC

Technical Analysis

CVE-2025-21251 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) that affects Microsoft Message Queuing (MSMQ) on Windows 10 Version 1507 (build 10.0.10240.0). MSMQ is a messaging protocol that allows applications running on separate servers/processes to communicate asynchronously. The vulnerability allows a remote attacker to send specially crafted messages to the MSMQ service, causing it to consume excessive system resources such as CPU, memory, or network bandwidth. This resource exhaustion leads to a denial of service (DoS) condition, making the MSMQ service or the entire system unresponsive or unavailable. The CVSS 3.1 base score is 7.5 (high), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N). The scope remains unchanged (S:U), and the impact affects availability only (A:H), with no confidentiality or integrity impact. The vulnerability was published on January 14, 2025, with no known exploits in the wild yet, but the lack of patches or mitigations in the provided data suggests that affected systems remain vulnerable. Since Windows 10 Version 1507 is an early release version, it is largely out of mainstream support, increasing the risk for organizations that have not upgraded. MSMQ is often used in enterprise environments for reliable message delivery, so disruption can impact business-critical applications.

Potential Impact

For European organizations, the primary impact of CVE-2025-21251 is the potential denial of service of MSMQ-dependent applications and services. This can lead to operational disruptions, especially in sectors relying on asynchronous messaging for transaction processing, logistics, or inter-service communication. Critical infrastructure, manufacturing, financial services, and government agencies using legacy Windows 10 systems with MSMQ enabled may experience service outages or degraded performance. The unavailability of MSMQ services can cascade into broader application failures, impacting business continuity and potentially causing financial losses. Since exploitation requires no authentication or user interaction, the attack surface is broad, and remote attackers can easily target exposed MSMQ services. The lack of known exploits currently limits immediate risk but does not preclude future active exploitation. Organizations still running Windows 10 Version 1507 are particularly vulnerable due to the absence of vendor patches and support.

Mitigation Recommendations

1. Upgrade affected systems from Windows 10 Version 1507 to a supported and patched Windows version to eliminate the vulnerability. 2. If upgrading is not immediately feasible, disable the Microsoft Message Queuing (MSMQ) service on affected systems if it is not essential for business operations. 3. Implement network-level controls such as firewall rules to restrict inbound traffic to MSMQ ports (typically TCP 1801) to trusted hosts only, minimizing exposure to remote attacks. 4. Monitor network traffic and system resource usage for unusual spikes that may indicate attempted exploitation. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics targeting MSMQ-related anomalies. 6. Develop and test incident response plans specifically addressing MSMQ service outages to reduce downtime. 7. Conduct asset inventory to identify all systems running Windows 10 Version 1507 with MSMQ enabled to prioritize remediation efforts. 8. Engage with Microsoft support or security advisories for any forthcoming patches or workarounds.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-10T23:54:12.930Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0bd4e9ed239a66badead0

Added to database: 9/9/2025, 11:50:38 PM

Last enriched: 2/14/2026, 8:07:19 AM

Last updated: 3/24/2026, 10:12:36 AM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses