Skip to main content

CVE-2025-21300: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2025-21300cvecve-2025-21300cwe-400
Published: Tue Jan 14 2025 (01/14/2025, 18:04:33 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows upnphost.dll Denial of Service Vulnerability

AI-Powered Analysis

AILast updated: 09/10/2025, 00:51:18 UTC

Technical Analysis

CVE-2025-21300 is a high-severity vulnerability identified in Microsoft Windows 10 Version 1809, specifically affecting the upnphost.dll component. This vulnerability is classified under CWE-400, which pertains to uncontrolled resource consumption, commonly known as a denial of service (DoS) vulnerability. The issue arises when the upnphost.dll module, responsible for handling Universal Plug and Play (UPnP) host functions, fails to properly manage resource allocation under certain conditions. An attacker can exploit this vulnerability remotely without requiring any privileges or user interaction by sending specially crafted network packets to the vulnerable system. Successful exploitation results in excessive consumption of system resources, leading to a denial of service condition where the affected system becomes unresponsive or crashes, impacting availability. The CVSS v3.1 base score of 7.5 reflects the vulnerability's high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The scope remains unchanged (S:U), and the impact is solely on availability (A:H), with no confidentiality or integrity impact. Currently, there are no known exploits in the wild, and no official patches have been linked yet, indicating that mitigation may rely on workarounds or vendor updates in the near future. This vulnerability specifically targets Windows 10 Version 1809 (build 10.0.17763.0), an older but still in-use version of Windows 10, which may be present in legacy systems or environments with delayed upgrade cycles.

Potential Impact

For European organizations, the impact of CVE-2025-21300 can be significant, particularly for those still operating Windows 10 Version 1809 in production environments. The vulnerability enables remote attackers to cause denial of service conditions without authentication or user interaction, potentially disrupting critical business operations, services, or infrastructure. This could affect sectors reliant on continuous availability such as finance, healthcare, manufacturing, and public services. The denial of service could lead to downtime, loss of productivity, and increased operational costs due to incident response and recovery efforts. Additionally, organizations with legacy systems that have not been updated may face increased risk exposure. While there is no direct impact on confidentiality or data integrity, the availability disruption alone can have cascading effects, including delayed transactions, interrupted communications, and potential reputational damage. The lack of known exploits in the wild currently reduces immediate risk, but the presence of a high-severity vulnerability in a widely deployed operating system version necessitates proactive measures.

Mitigation Recommendations

Given the absence of an official patch at the time of this report, European organizations should implement the following specific mitigation strategies: 1) Identify and inventory all systems running Windows 10 Version 1809 to assess exposure. 2) Where feasible, prioritize upgrading or migrating affected systems to a more recent, supported Windows 10 version or Windows 11, which are less likely to be vulnerable. 3) Implement network-level protections such as firewall rules to restrict or block inbound UPnP traffic (typically UDP ports 1900 and related) from untrusted networks, especially the internet, to reduce attack surface. 4) Employ intrusion detection and prevention systems (IDS/IPS) with signatures or anomaly detection capabilities to monitor and alert on suspicious UPnP traffic patterns. 5) Apply system hardening best practices, including disabling UPnP services on endpoints and network devices where not required. 6) Monitor vendor communications for the release of official patches or updates and apply them promptly. 7) Develop and test incident response plans specifically for denial of service scenarios to minimize downtime impact. These targeted actions go beyond generic advice by focusing on the specific vulnerable component and attack vector, helping to mitigate risk until a patch is available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-10T23:54:12.950Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0bd509ed239a66badeb76

Added to database: 9/9/2025, 11:50:40 PM

Last enriched: 9/10/2025, 12:51:18 AM

Last updated: 9/10/2025, 4:29:07 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats