Skip to main content

CVE-2025-21270: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2025-21270cvecve-2025-21270cwe-400
Published: Tue Jan 14 2025 (01/14/2025, 18:03:40 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability

AI-Powered Analysis

AILast updated: 09/10/2025, 01:21:15 UTC

Technical Analysis

CVE-2025-21270 is a high-severity vulnerability affecting Microsoft Windows 10 Version 1809, specifically targeting the Microsoft Message Queuing (MSMQ) service. The vulnerability is categorized under CWE-400, which relates to uncontrolled resource consumption, commonly known as a denial of service (DoS) condition. MSMQ is a messaging protocol that allows applications running on separate servers/processes to communicate asynchronously. The flaw allows an unauthenticated remote attacker to trigger excessive resource consumption on the affected system without requiring user interaction. The CVSS v3.1 base score is 7.5, indicating a high impact primarily on availability (A:H), with no impact on confidentiality or integrity. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The vulnerability is unscoped (S:U), meaning the impact is limited to the vulnerable component. Although no known exploits are currently in the wild, the vulnerability's characteristics suggest it could be weaponized to disrupt services by exhausting system resources such as CPU, memory, or MSMQ-specific resources, leading to service outages or degraded performance. The lack of patch links indicates that a fix may not yet be publicly available, increasing the urgency for mitigation through alternative means.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the availability of critical systems running Windows 10 Version 1809 with MSMQ enabled. MSMQ is often used in enterprise environments for reliable message delivery in distributed applications, including financial services, manufacturing, and government infrastructure. A successful exploitation could lead to denial of service conditions, disrupting business operations, causing downtime, and potentially impacting service-level agreements (SLAs). Given the network-based attack vector and no requirement for authentication or user interaction, attackers could remotely target exposed MSMQ services, potentially affecting public-facing or poorly segmented internal networks. This could be particularly damaging for sectors reliant on real-time messaging and transaction processing. Additionally, the persistence of Windows 10 Version 1809 in some legacy or specialized systems across Europe increases the attack surface. The absence of known exploits currently provides a window for proactive defense, but the high severity score underscores the need for immediate attention.

Mitigation Recommendations

1. Immediate mitigation should focus on network-level controls: restrict access to MSMQ ports (default TCP 1801) using firewalls or network segmentation to limit exposure to trusted hosts only. 2. Disable MSMQ service on systems where it is not required to reduce the attack surface. 3. For systems that must run MSMQ, monitor resource utilization closely to detect abnormal spikes indicative of exploitation attempts. 4. Implement intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection tuned for MSMQ traffic anomalies. 5. Apply any available vendor advisories or interim patches as soon as they are released. 6. Plan and prioritize upgrading or patching affected Windows 10 Version 1809 systems to a supported and patched version of Windows, as this version is nearing or past end-of-support in many environments. 7. Employ application whitelisting and endpoint protection to detect and block suspicious activities related to MSMQ exploitation. 8. Conduct regular security assessments and penetration tests focusing on MSMQ exposure and resilience against resource exhaustion attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-10T23:54:12.936Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0bd4f9ed239a66badeb01

Added to database: 9/9/2025, 11:50:39 PM

Last enriched: 9/10/2025, 1:21:15 AM

Last updated: 9/10/2025, 4:07:21 AM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats