Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21270: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1507

0
High
VulnerabilityCVE-2025-21270cvecve-2025-21270cwe-400
Published: Tue Jan 14 2025 (01/14/2025, 18:03:40 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 08:10:35 UTC

Technical Analysis

CVE-2025-21270 is a denial of service (DoS) vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting Microsoft Message Queuing (MSMQ) on Windows 10 Version 1507 (build 10.0.10240.0). MSMQ is a messaging protocol that allows applications running on separate servers/processes to communicate asynchronously. The vulnerability allows an unauthenticated remote attacker to send specially crafted messages to the MSMQ service, causing it to consume excessive system resources such as memory or CPU cycles. This resource exhaustion can lead to service degradation or complete denial of service, impacting the availability of MSMQ-dependent applications and potentially the host system. The vulnerability requires no user interaction or privileges, making it easier to exploit remotely over the network. Despite the high CVSS score of 7.5, no public exploits have been reported yet. The affected Windows 10 version is an early release (1507), which is largely superseded by newer versions, but some legacy systems may still be operational. The lack of linked patches suggests that mitigation may require upgrading to a supported Windows version or applying forthcoming security updates from Microsoft. The vulnerability’s impact is limited to availability, with no direct confidentiality or integrity compromise. However, disruption of MSMQ services can affect business-critical messaging workflows and dependent applications.

Potential Impact

For European organizations, this vulnerability poses a significant risk to operational continuity, especially for those still running legacy Windows 10 Version 1507 systems. MSMQ is often used in enterprise environments for asynchronous communication between distributed applications, including financial services, manufacturing, and public sector systems. A successful DoS attack could disrupt these communications, leading to application failures, delayed transactions, or system outages. This can have cascading effects on business operations, customer service, and regulatory compliance. Critical infrastructure sectors relying on MSMQ for messaging may experience service interruptions, potentially impacting public safety or essential services. The ease of remote exploitation without authentication increases the threat level, particularly for organizations with exposed MSMQ endpoints. Although no exploits are currently known in the wild, the vulnerability’s existence and high severity score necessitate proactive risk management. European entities with legacy IT environments or slow patch cycles are particularly vulnerable. The impact is primarily on availability, but indirect effects on business continuity and reputation can be substantial.

Mitigation Recommendations

Given the absence of a direct patch link, the primary mitigation is to upgrade affected systems from Windows 10 Version 1507 to a supported and patched Windows version where this vulnerability is resolved. Organizations should inventory their environments to identify any systems still running this legacy build. Network-level controls should be implemented to restrict access to MSMQ services, such as firewall rules limiting inbound traffic to trusted hosts and networks. Monitoring and alerting on unusual MSMQ traffic patterns can help detect potential exploitation attempts. Employing network segmentation to isolate legacy systems reduces exposure. If upgrading immediately is not feasible, consider disabling MSMQ on affected systems if it is not critical to business operations. Additionally, applying any interim security guidance or workarounds provided by Microsoft upon release of official advisories is recommended. Regularly review and update endpoint protection and intrusion detection systems to identify anomalous activity targeting MSMQ. Finally, ensure incident response plans include scenarios for MSMQ service disruption to minimize operational impact.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-10T23:54:12.936Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0bd4f9ed239a66badeb01

Added to database: 9/9/2025, 11:50:39 PM

Last enriched: 2/14/2026, 8:10:35 AM

Last updated: 3/26/2026, 10:30:04 AM

Views: 47

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses