Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21285: CWE-476: NULL Pointer Dereference in Microsoft Windows 10 Version 1507

0
High
VulnerabilityCVE-2025-21285cvecve-2025-21285cwe-476
Published: Tue Jan 14 2025 (01/14/2025, 18:03:45 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 08:13:34 UTC

Technical Analysis

CVE-2025-21285 is a vulnerability identified in Microsoft Windows 10 Version 1507 (build 10240) affecting the Microsoft Message Queuing (MSMQ) service. The issue is classified as a NULL pointer dereference (CWE-476), which occurs when the MSMQ service processes specially crafted network packets. This flaw allows an unauthenticated remote attacker to cause the MSMQ service to dereference a NULL pointer, resulting in a denial of service (DoS) condition by crashing the service or potentially the entire system. The vulnerability has a CVSS v3.1 base score of 7.5, reflecting its high severity due to network attack vector, no required privileges or user interaction, and a significant impact on availability. The flaw does not affect confidentiality or integrity, as it does not allow code execution or data manipulation. No public exploits have been reported yet, and no patches are currently linked, indicating that mitigation may rely on workarounds or future updates. MSMQ is commonly used in enterprise environments for asynchronous message communication, so disruption can impact business-critical applications. The vulnerability is particularly relevant for organizations still running the original Windows 10 release, which is generally out of mainstream support, but may persist in legacy or isolated environments. The technical details confirm the vulnerability was reserved in December 2024 and published in January 2025, with Microsoft as the assigner. The lack of known exploits suggests limited immediate threat but warrants proactive mitigation due to the ease of triggering the DoS remotely without authentication.

Potential Impact

The primary impact of CVE-2025-21285 is a denial of service condition affecting the availability of systems running Windows 10 Version 1507 with MSMQ enabled. For European organizations, this can disrupt critical messaging infrastructure used in financial services, manufacturing, healthcare, and government sectors that rely on MSMQ for reliable asynchronous communication. The inability to process messages can halt workflows, delay transactions, and cause operational downtime. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized data manipulation are not a direct concern. However, the service disruption can indirectly affect business continuity and compliance with service-level agreements. Legacy systems still in use in some European countries, especially in industries with long upgrade cycles or regulatory constraints, are at higher risk. The lack of required authentication and user interaction makes exploitation relatively easy for remote attackers, increasing the threat landscape. Although no exploits are known in the wild, the vulnerability's presence in an unsupported OS version limits widespread impact but does not eliminate risk for organizations with legacy deployments.

Mitigation Recommendations

To mitigate CVE-2025-21285, European organizations should first identify any systems running Windows 10 Version 1507 with MSMQ enabled. Given the lack of an official patch at this time, immediate steps include disabling the MSMQ service on affected systems if it is not essential to business operations. For systems that require MSMQ, network-level controls such as firewall rules should be implemented to restrict access to MSMQ ports (default TCP 1801) from untrusted networks, minimizing exposure to remote attacks. Organizations should also consider upgrading affected systems to a supported Windows 10 version or later, where this vulnerability is not present. Monitoring network traffic for unusual MSMQ activity can help detect attempted exploitation. Once Microsoft releases a security update, prompt deployment is critical. Additionally, organizations should review their incident response plans to handle potential denial of service incidents impacting messaging infrastructure. Regular vulnerability scanning and asset inventory management will aid in identifying at-risk systems and ensuring timely remediation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-10T23:54:12.944Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0bd509ed239a66badeb42

Added to database: 9/9/2025, 11:50:40 PM

Last enriched: 2/14/2026, 8:13:34 AM

Last updated: 3/28/2026, 9:15:50 AM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses