CVE-2025-21330: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809
Windows Remote Desktop Services Denial of Service Vulnerability
AI Analysis
Technical Summary
CVE-2025-21330 is a high-severity vulnerability affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0), specifically targeting the Windows Remote Desktop Services (RDS). The vulnerability is classified under CWE-400, which relates to uncontrolled resource consumption, commonly known as a denial of service (DoS) condition. This flaw allows an unauthenticated attacker to remotely trigger excessive resource usage within the RDS component without requiring any user interaction. The CVSS v3.1 base score is 7.5, indicating a high impact primarily on availability (A:H), with no impact on confidentiality or integrity. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component and does not propagate to other components. The exploitability level is officially unknown (E:U), and remediation level is official (RL:O), with a confirmed report confidence (RC:C). Although no public exploits have been reported in the wild yet, the nature of the vulnerability suggests that attackers could potentially flood the RDS service with crafted requests to exhaust system resources such as CPU, memory, or network sockets, leading to service degradation or complete denial of remote desktop access. This could disrupt business operations relying on remote access, especially in environments where Windows 10 1809 remains in use. The absence of patch links indicates that a fix may not yet be publicly available, increasing the urgency for mitigation.
Potential Impact
For European organizations, the impact of this vulnerability could be significant, particularly for enterprises and public sector entities that rely heavily on Remote Desktop Services for remote work, IT administration, or customer support. A successful denial of service attack could lead to widespread disruption of remote access capabilities, affecting productivity and potentially delaying critical operations. Sectors such as finance, healthcare, and government, which often maintain legacy systems including Windows 10 1809, may face increased risk. The unavailability of RDS could also hinder incident response and recovery efforts during other cyber incidents. Additionally, organizations with remote workforce setups could experience operational downtime, impacting business continuity. While confidentiality and integrity are not directly affected, the availability impact alone can cause substantial operational and financial damage.
Mitigation Recommendations
Given the lack of an official patch at this time, European organizations should implement specific mitigations beyond generic advice: 1) Restrict Remote Desktop Services exposure by limiting RDS access to trusted internal networks or via secure VPN tunnels, reducing the attack surface. 2) Employ network-level authentication (NLA) and enforce strong access controls to prevent unauthorized connection attempts. 3) Monitor RDS-related network traffic for unusual spikes or patterns indicative of resource exhaustion attacks, using intrusion detection/prevention systems (IDS/IPS) and security information and event management (SIEM) tools. 4) Consider temporarily disabling RDS on Windows 10 1809 systems where feasible until a patch is available. 5) Implement rate limiting or connection throttling on RDS endpoints to mitigate flooding attempts. 6) Plan and prioritize upgrading affected systems to supported Windows versions with active security updates to eliminate exposure. 7) Maintain robust incident response plans that include procedures for handling RDS service outages. These targeted actions will help reduce the risk and impact of exploitation while awaiting official remediation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-21330: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809
Description
Windows Remote Desktop Services Denial of Service Vulnerability
AI-Powered Analysis
Technical Analysis
CVE-2025-21330 is a high-severity vulnerability affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0), specifically targeting the Windows Remote Desktop Services (RDS). The vulnerability is classified under CWE-400, which relates to uncontrolled resource consumption, commonly known as a denial of service (DoS) condition. This flaw allows an unauthenticated attacker to remotely trigger excessive resource usage within the RDS component without requiring any user interaction. The CVSS v3.1 base score is 7.5, indicating a high impact primarily on availability (A:H), with no impact on confidentiality or integrity. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component and does not propagate to other components. The exploitability level is officially unknown (E:U), and remediation level is official (RL:O), with a confirmed report confidence (RC:C). Although no public exploits have been reported in the wild yet, the nature of the vulnerability suggests that attackers could potentially flood the RDS service with crafted requests to exhaust system resources such as CPU, memory, or network sockets, leading to service degradation or complete denial of remote desktop access. This could disrupt business operations relying on remote access, especially in environments where Windows 10 1809 remains in use. The absence of patch links indicates that a fix may not yet be publicly available, increasing the urgency for mitigation.
Potential Impact
For European organizations, the impact of this vulnerability could be significant, particularly for enterprises and public sector entities that rely heavily on Remote Desktop Services for remote work, IT administration, or customer support. A successful denial of service attack could lead to widespread disruption of remote access capabilities, affecting productivity and potentially delaying critical operations. Sectors such as finance, healthcare, and government, which often maintain legacy systems including Windows 10 1809, may face increased risk. The unavailability of RDS could also hinder incident response and recovery efforts during other cyber incidents. Additionally, organizations with remote workforce setups could experience operational downtime, impacting business continuity. While confidentiality and integrity are not directly affected, the availability impact alone can cause substantial operational and financial damage.
Mitigation Recommendations
Given the lack of an official patch at this time, European organizations should implement specific mitigations beyond generic advice: 1) Restrict Remote Desktop Services exposure by limiting RDS access to trusted internal networks or via secure VPN tunnels, reducing the attack surface. 2) Employ network-level authentication (NLA) and enforce strong access controls to prevent unauthorized connection attempts. 3) Monitor RDS-related network traffic for unusual spikes or patterns indicative of resource exhaustion attacks, using intrusion detection/prevention systems (IDS/IPS) and security information and event management (SIEM) tools. 4) Consider temporarily disabling RDS on Windows 10 1809 systems where feasible until a patch is available. 5) Implement rate limiting or connection throttling on RDS endpoints to mitigate flooding attempts. 6) Plan and prioritize upgrading affected systems to supported Windows versions with active security updates to eliminate exposure. 7) Maintain robust incident response plans that include procedures for handling RDS service outages. These targeted actions will help reduce the risk and impact of exploitation while awaiting official remediation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2024-12-11T00:29:48.349Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c0bd529ed239a66badebe5
Added to database: 9/9/2025, 11:50:42 PM
Last enriched: 9/10/2025, 12:36:03 AM
Last updated: 9/10/2025, 4:07:21 AM
Views: 2
Related Threats
CVE-2025-8388: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ideaboxcreations PowerPack Elementor Addons (Free Widgets, Extensions and Templates)
MediumCVE-2025-59038: CWE-506: Embedded Malicious Code in prebid Prebid.js
HighCVE-2025-10197: SQL Injection in HJSoft HCM Human Resources Management System
MediumCVE-2025-10195: Improper Export of Android Application Components in Seismic App
MediumCVE-2025-21417: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.