Skip to main content

CVE-2025-21330: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2025-21330cvecve-2025-21330cwe-400
Published: Tue Jan 14 2025 (01/14/2025, 18:04:16 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Remote Desktop Services Denial of Service Vulnerability

AI-Powered Analysis

AILast updated: 09/10/2025, 00:36:03 UTC

Technical Analysis

CVE-2025-21330 is a high-severity vulnerability affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0), specifically targeting the Windows Remote Desktop Services (RDS). The vulnerability is classified under CWE-400, which relates to uncontrolled resource consumption, commonly known as a denial of service (DoS) condition. This flaw allows an unauthenticated attacker to remotely trigger excessive resource usage within the RDS component without requiring any user interaction. The CVSS v3.1 base score is 7.5, indicating a high impact primarily on availability (A:H), with no impact on confidentiality or integrity. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component and does not propagate to other components. The exploitability level is officially unknown (E:U), and remediation level is official (RL:O), with a confirmed report confidence (RC:C). Although no public exploits have been reported in the wild yet, the nature of the vulnerability suggests that attackers could potentially flood the RDS service with crafted requests to exhaust system resources such as CPU, memory, or network sockets, leading to service degradation or complete denial of remote desktop access. This could disrupt business operations relying on remote access, especially in environments where Windows 10 1809 remains in use. The absence of patch links indicates that a fix may not yet be publicly available, increasing the urgency for mitigation.

Potential Impact

For European organizations, the impact of this vulnerability could be significant, particularly for enterprises and public sector entities that rely heavily on Remote Desktop Services for remote work, IT administration, or customer support. A successful denial of service attack could lead to widespread disruption of remote access capabilities, affecting productivity and potentially delaying critical operations. Sectors such as finance, healthcare, and government, which often maintain legacy systems including Windows 10 1809, may face increased risk. The unavailability of RDS could also hinder incident response and recovery efforts during other cyber incidents. Additionally, organizations with remote workforce setups could experience operational downtime, impacting business continuity. While confidentiality and integrity are not directly affected, the availability impact alone can cause substantial operational and financial damage.

Mitigation Recommendations

Given the lack of an official patch at this time, European organizations should implement specific mitigations beyond generic advice: 1) Restrict Remote Desktop Services exposure by limiting RDS access to trusted internal networks or via secure VPN tunnels, reducing the attack surface. 2) Employ network-level authentication (NLA) and enforce strong access controls to prevent unauthorized connection attempts. 3) Monitor RDS-related network traffic for unusual spikes or patterns indicative of resource exhaustion attacks, using intrusion detection/prevention systems (IDS/IPS) and security information and event management (SIEM) tools. 4) Consider temporarily disabling RDS on Windows 10 1809 systems where feasible until a patch is available. 5) Implement rate limiting or connection throttling on RDS endpoints to mitigate flooding attempts. 6) Plan and prioritize upgrading affected systems to supported Windows versions with active security updates to eliminate exposure. 7) Maintain robust incident response plans that include procedures for handling RDS service outages. These targeted actions will help reduce the risk and impact of exploitation while awaiting official remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-11T00:29:48.349Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0bd529ed239a66badebe5

Added to database: 9/9/2025, 11:50:42 PM

Last enriched: 9/10/2025, 12:36:03 AM

Last updated: 9/10/2025, 4:07:21 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats