CVE-2025-21330: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809
Windows Remote Desktop Services Denial of Service Vulnerability
AI Analysis
Technical Summary
CVE-2025-21330 is a high-severity vulnerability affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0), specifically targeting the Windows Remote Desktop Services (RDS). The vulnerability is classified under CWE-400, which relates to uncontrolled resource consumption, commonly known as a denial of service (DoS) condition. This flaw allows an unauthenticated attacker to remotely trigger excessive resource usage within the RDS component without requiring any user interaction. The CVSS v3.1 base score is 7.5, indicating a high impact primarily on availability (A:H), with no impact on confidentiality or integrity. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component and does not propagate to other components. The exploitability level is officially unknown (E:U), and remediation level is official (RL:O), with a confirmed report confidence (RC:C). Although no public exploits have been reported in the wild yet, the nature of the vulnerability suggests that attackers could potentially flood the RDS service with crafted requests to exhaust system resources such as CPU, memory, or network sockets, leading to service degradation or complete denial of remote desktop access. This could disrupt business operations relying on remote access, especially in environments where Windows 10 1809 remains in use. The absence of patch links indicates that a fix may not yet be publicly available, increasing the urgency for mitigation.
Potential Impact
For European organizations, the impact of this vulnerability could be significant, particularly for enterprises and public sector entities that rely heavily on Remote Desktop Services for remote work, IT administration, or customer support. A successful denial of service attack could lead to widespread disruption of remote access capabilities, affecting productivity and potentially delaying critical operations. Sectors such as finance, healthcare, and government, which often maintain legacy systems including Windows 10 1809, may face increased risk. The unavailability of RDS could also hinder incident response and recovery efforts during other cyber incidents. Additionally, organizations with remote workforce setups could experience operational downtime, impacting business continuity. While confidentiality and integrity are not directly affected, the availability impact alone can cause substantial operational and financial damage.
Mitigation Recommendations
Given the lack of an official patch at this time, European organizations should implement specific mitigations beyond generic advice: 1) Restrict Remote Desktop Services exposure by limiting RDS access to trusted internal networks or via secure VPN tunnels, reducing the attack surface. 2) Employ network-level authentication (NLA) and enforce strong access controls to prevent unauthorized connection attempts. 3) Monitor RDS-related network traffic for unusual spikes or patterns indicative of resource exhaustion attacks, using intrusion detection/prevention systems (IDS/IPS) and security information and event management (SIEM) tools. 4) Consider temporarily disabling RDS on Windows 10 1809 systems where feasible until a patch is available. 5) Implement rate limiting or connection throttling on RDS endpoints to mitigate flooding attempts. 6) Plan and prioritize upgrading affected systems to supported Windows versions with active security updates to eliminate exposure. 7) Maintain robust incident response plans that include procedures for handling RDS service outages. These targeted actions will help reduce the risk and impact of exploitation while awaiting official remediation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-21330: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809
Description
Windows Remote Desktop Services Denial of Service Vulnerability
AI-Powered Analysis
Technical Analysis
CVE-2025-21330 is a high-severity vulnerability affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0), specifically targeting the Windows Remote Desktop Services (RDS). The vulnerability is classified under CWE-400, which relates to uncontrolled resource consumption, commonly known as a denial of service (DoS) condition. This flaw allows an unauthenticated attacker to remotely trigger excessive resource usage within the RDS component without requiring any user interaction. The CVSS v3.1 base score is 7.5, indicating a high impact primarily on availability (A:H), with no impact on confidentiality or integrity. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component and does not propagate to other components. The exploitability level is officially unknown (E:U), and remediation level is official (RL:O), with a confirmed report confidence (RC:C). Although no public exploits have been reported in the wild yet, the nature of the vulnerability suggests that attackers could potentially flood the RDS service with crafted requests to exhaust system resources such as CPU, memory, or network sockets, leading to service degradation or complete denial of remote desktop access. This could disrupt business operations relying on remote access, especially in environments where Windows 10 1809 remains in use. The absence of patch links indicates that a fix may not yet be publicly available, increasing the urgency for mitigation.
Potential Impact
For European organizations, the impact of this vulnerability could be significant, particularly for enterprises and public sector entities that rely heavily on Remote Desktop Services for remote work, IT administration, or customer support. A successful denial of service attack could lead to widespread disruption of remote access capabilities, affecting productivity and potentially delaying critical operations. Sectors such as finance, healthcare, and government, which often maintain legacy systems including Windows 10 1809, may face increased risk. The unavailability of RDS could also hinder incident response and recovery efforts during other cyber incidents. Additionally, organizations with remote workforce setups could experience operational downtime, impacting business continuity. While confidentiality and integrity are not directly affected, the availability impact alone can cause substantial operational and financial damage.
Mitigation Recommendations
Given the lack of an official patch at this time, European organizations should implement specific mitigations beyond generic advice: 1) Restrict Remote Desktop Services exposure by limiting RDS access to trusted internal networks or via secure VPN tunnels, reducing the attack surface. 2) Employ network-level authentication (NLA) and enforce strong access controls to prevent unauthorized connection attempts. 3) Monitor RDS-related network traffic for unusual spikes or patterns indicative of resource exhaustion attacks, using intrusion detection/prevention systems (IDS/IPS) and security information and event management (SIEM) tools. 4) Consider temporarily disabling RDS on Windows 10 1809 systems where feasible until a patch is available. 5) Implement rate limiting or connection throttling on RDS endpoints to mitigate flooding attempts. 6) Plan and prioritize upgrading affected systems to supported Windows versions with active security updates to eliminate exposure. 7) Maintain robust incident response plans that include procedures for handling RDS service outages. These targeted actions will help reduce the risk and impact of exploitation while awaiting official remediation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2024-12-11T00:29:48.349Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c0bd529ed239a66badebe5
Added to database: 9/9/2025, 11:50:42 PM
Last enriched: 9/10/2025, 12:36:03 AM
Last updated: 10/30/2025, 8:32:14 AM
Views: 30
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11906: CWE-732 Incorrect Permission Assignment for Critical Resource in Progress Software Flowmon
MediumCVE-2025-11881: CWE-862 Missing Authorization in scottopolis AppPresser – Mobile App Framework
MediumCVE-2025-62229: Use After Free in Red Hat Red Hat Enterprise Linux 10
HighCVE-2025-11627: CWE-117 Improper Output Neutralization for Logs in sminozzi Site Checkup Debug AI Troubleshooting with Wizard and Tips for Each Issue
MediumCVE-2025-10008: CWE-862 Missing Authorization in remyb92 Translate WordPress and go Multilingual – Weglot
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.