Skip to main content

CVE-2025-21290: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2025-21290cvecve-2025-21290cwe-400
Published: Tue Jan 14 2025 (01/14/2025, 18:03:47 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability

AI-Powered Analysis

AILast updated: 09/10/2025, 01:06:24 UTC

Technical Analysis

CVE-2025-21290 is a high-severity vulnerability affecting Microsoft Windows 10 Version 1809, specifically targeting the Microsoft Message Queuing (MSMQ) component. The vulnerability is classified under CWE-400, which corresponds to uncontrolled resource consumption, commonly known as a denial of service (DoS) condition. MSMQ is a messaging protocol that allows applications running on separate servers/processes to communicate asynchronously. This vulnerability arises when MSMQ improperly handles certain inputs or requests, leading to excessive consumption of system resources such as CPU, memory, or disk I/O. The CVSS 3.1 score of 7.5 indicates a high impact primarily on availability, with no impact on confidentiality or integrity. The attack vector is network-based (AV:N), requiring no privileges (PR:N) and no user interaction (UI:N), making it relatively easy to exploit remotely. The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component without impacting other system components. Although no known exploits are currently reported in the wild, the potential for denial of service attacks exists, which could disrupt critical services relying on MSMQ. The affected version is Windows 10 1809 (build 10.0.17763.0), an older but still in-use operating system version in some environments. No patches or mitigations have been linked yet, indicating that organizations must be vigilant and consider interim protective measures until official updates are available.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on legacy Windows 10 1809 systems running MSMQ for critical messaging and communication workflows. A successful exploitation could lead to denial of service conditions, causing application outages, disruption of business processes, and potential cascading failures in interconnected systems. This is particularly concerning for sectors such as finance, manufacturing, healthcare, and government services where MSMQ might be used for asynchronous message delivery. The lack of required privileges or user interaction lowers the barrier for attackers, increasing the risk of automated or widespread attacks. Although confidentiality and integrity are not directly impacted, availability disruptions can lead to operational downtime, financial losses, and reputational damage. Moreover, the absence of known exploits in the wild does not preclude future exploitation, especially as threat actors often develop exploits for high-impact vulnerabilities once disclosed.

Mitigation Recommendations

Given the absence of official patches at this time, European organizations should implement specific mitigations beyond generic advice: 1) Identify and inventory all systems running Windows 10 Version 1809 with MSMQ enabled to assess exposure. 2) Where possible, upgrade affected systems to a supported and patched Windows version to eliminate the vulnerability. 3) Restrict network access to MSMQ services by implementing firewall rules that limit inbound traffic to trusted sources only, reducing the attack surface. 4) Monitor MSMQ-related network traffic and system resource usage for anomalies indicative of exploitation attempts, using SIEM or endpoint detection tools. 5) Employ rate limiting or throttling on MSMQ message processing if configurable, to prevent resource exhaustion. 6) Prepare incident response plans specifically addressing denial of service scenarios impacting MSMQ-dependent applications. 7) Stay informed on vendor advisories for patches or workarounds and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-10T23:54:12.945Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0bd509ed239a66badeb51

Added to database: 9/9/2025, 11:50:40 PM

Last enriched: 9/10/2025, 1:06:24 AM

Last updated: 9/10/2025, 4:38:52 AM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats