Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21290: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1507

0
High
VulnerabilityCVE-2025-21290cvecve-2025-21290cwe-400
Published: Tue Jan 14 2025 (01/14/2025, 18:03:47 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 08:14:39 UTC

Technical Analysis

CVE-2025-21290 is a denial of service (DoS) vulnerability in Microsoft Windows 10 Version 1507 (build 10.0.10240.0) affecting the Microsoft Message Queuing (MSMQ) component. The vulnerability is categorized under CWE-400, which involves uncontrolled resource consumption. MSMQ is a messaging protocol that enables applications running on separate servers/processes to communicate asynchronously. The flaw allows an unauthenticated attacker to remotely send specially crafted messages to the MSMQ service, triggering excessive resource consumption such as CPU, memory, or queue storage. This resource exhaustion can cause the MSMQ service or the entire system to become unresponsive or crash, resulting in denial of service. The CVSS v3.1 base score is 7.5, indicating high severity, with an attack vector of network (AV:N), no privileges required (PR:N), and no user interaction needed (UI:N). The scope is unchanged (S:U), and the impact affects availability only (A:H), with no impact on confidentiality or integrity. No known exploits have been reported in the wild as of the publication date, but the vulnerability is publicly disclosed and could be targeted by attackers. No patches or mitigations were provided at the time of disclosure, emphasizing the need for vigilance and proactive defense measures. The vulnerability primarily affects legacy Windows 10 installations, which may still be in use in some enterprise environments.

Potential Impact

For European organizations, the primary impact of CVE-2025-21290 is the potential disruption of critical services relying on MSMQ for asynchronous messaging. This can affect financial institutions, manufacturing systems, healthcare providers, and government agencies that use legacy Windows 10 systems in their infrastructure. Denial of service conditions could lead to operational downtime, loss of productivity, and potential cascading failures in interconnected systems. While confidentiality and integrity are not directly impacted, the availability loss could hinder business continuity and service delivery. Organizations with legacy systems that have not been upgraded or patched are particularly vulnerable. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits following public disclosure. The impact is exacerbated in environments where MSMQ is critical for internal communications or transaction processing, making timely mitigation essential to avoid service interruptions.

Mitigation Recommendations

Given the lack of an official patch at the time of disclosure, European organizations should prioritize upgrading affected systems from Windows 10 Version 1507 to a supported and patched Windows version to eliminate exposure. If upgrading is not immediately feasible, organizations should consider disabling the MSMQ service if it is not essential to operations, thereby removing the attack surface. Network-level controls such as firewall rules should be implemented to restrict inbound traffic to MSMQ ports (default TCP 1801) to trusted hosts only. Monitoring and alerting on unusual MSMQ traffic patterns or resource usage spikes can help detect attempted exploitation. Additionally, organizations should maintain robust incident response plans to quickly address any service disruptions. Regularly reviewing asset inventories to identify legacy Windows 10 systems and prioritizing their remediation will reduce risk. Finally, staying updated with Microsoft advisories for any forthcoming patches or workarounds is critical.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-10T23:54:12.945Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0bd509ed239a66badeb51

Added to database: 9/9/2025, 11:50:40 PM

Last enriched: 2/14/2026, 8:14:39 AM

Last updated: 3/21/2026, 1:56:07 AM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses