CVE-2025-21351: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1607
Windows Active Directory Domain Services API Denial of Service Vulnerability
AI Analysis
Technical Summary
CVE-2025-21351 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting Microsoft Windows 10 Version 1607 (build 10.0.14393.0). It specifically targets the Active Directory Domain Services API, a critical component responsible for directory services in Windows environments. The vulnerability allows an unauthenticated remote attacker to send crafted requests to the Active Directory API, causing excessive consumption of system resources such as memory or CPU. This resource exhaustion leads to a denial of service (DoS) condition, rendering the affected system or service unavailable to legitimate users. The CVSS v3.1 base score is 7.5 (high), indicating a network attack vector with low complexity, no privileges required, and no user interaction needed. The scope is unchanged, and the impact is limited to availability, with no confidentiality or integrity impact. No known exploits have been reported in the wild, and no official patches have been published as of the vulnerability disclosure date (February 11, 2025). The vulnerability is particularly concerning for environments running legacy Windows 10 1607 systems, which are often found in enterprise and government infrastructures that rely heavily on Active Directory for authentication and authorization services. The lack of patches and the ease of exploitation make this a significant risk for denial of service attacks that can disrupt business operations and critical services.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the availability of Active Directory services, which are foundational for identity management, authentication, and access control in enterprise networks. A successful denial of service attack could disrupt user logins, access to network resources, and overall IT operations, potentially halting business processes and critical infrastructure functions. Organizations still running Windows 10 Version 1607, especially in sectors such as government, finance, healthcare, and manufacturing, may face operational downtime and increased incident response costs. The inability to authenticate users or access directory services can also impact compliance with regulatory requirements such as GDPR, which mandates secure and reliable access controls. Since the vulnerability requires no authentication and no user interaction, attackers can exploit it remotely, increasing the risk of widespread disruption. The absence of patches further exacerbates the threat, forcing organizations to rely on compensating controls until updates are available.
Mitigation Recommendations
1. Immediately restrict network access to Active Directory Domain Services APIs by implementing strict firewall rules and network segmentation to limit exposure to untrusted networks. 2. Monitor system resource usage closely on Windows 10 Version 1607 systems, setting up alerts for unusual CPU or memory consumption patterns that may indicate exploitation attempts. 3. Employ intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics tuned to detect anomalous Active Directory API traffic. 4. Prioritize upgrading or migrating systems from Windows 10 Version 1607 to supported, patched versions of Windows 10 or Windows 11 to eliminate the vulnerability. 5. Implement rate limiting or throttling on Active Directory API requests where possible to mitigate resource exhaustion. 6. Conduct regular audits of legacy systems and decommission unsupported operating systems to reduce attack surface. 7. Prepare incident response plans specifically addressing denial of service scenarios targeting directory services. 8. Engage with Microsoft support channels for any available workarounds or early patches and subscribe to security advisories for timely updates.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-21351: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1607
Description
Windows Active Directory Domain Services API Denial of Service Vulnerability
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-21351 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting Microsoft Windows 10 Version 1607 (build 10.0.14393.0). It specifically targets the Active Directory Domain Services API, a critical component responsible for directory services in Windows environments. The vulnerability allows an unauthenticated remote attacker to send crafted requests to the Active Directory API, causing excessive consumption of system resources such as memory or CPU. This resource exhaustion leads to a denial of service (DoS) condition, rendering the affected system or service unavailable to legitimate users. The CVSS v3.1 base score is 7.5 (high), indicating a network attack vector with low complexity, no privileges required, and no user interaction needed. The scope is unchanged, and the impact is limited to availability, with no confidentiality or integrity impact. No known exploits have been reported in the wild, and no official patches have been published as of the vulnerability disclosure date (February 11, 2025). The vulnerability is particularly concerning for environments running legacy Windows 10 1607 systems, which are often found in enterprise and government infrastructures that rely heavily on Active Directory for authentication and authorization services. The lack of patches and the ease of exploitation make this a significant risk for denial of service attacks that can disrupt business operations and critical services.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the availability of Active Directory services, which are foundational for identity management, authentication, and access control in enterprise networks. A successful denial of service attack could disrupt user logins, access to network resources, and overall IT operations, potentially halting business processes and critical infrastructure functions. Organizations still running Windows 10 Version 1607, especially in sectors such as government, finance, healthcare, and manufacturing, may face operational downtime and increased incident response costs. The inability to authenticate users or access directory services can also impact compliance with regulatory requirements such as GDPR, which mandates secure and reliable access controls. Since the vulnerability requires no authentication and no user interaction, attackers can exploit it remotely, increasing the risk of widespread disruption. The absence of patches further exacerbates the threat, forcing organizations to rely on compensating controls until updates are available.
Mitigation Recommendations
1. Immediately restrict network access to Active Directory Domain Services APIs by implementing strict firewall rules and network segmentation to limit exposure to untrusted networks. 2. Monitor system resource usage closely on Windows 10 Version 1607 systems, setting up alerts for unusual CPU or memory consumption patterns that may indicate exploitation attempts. 3. Employ intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics tuned to detect anomalous Active Directory API traffic. 4. Prioritize upgrading or migrating systems from Windows 10 Version 1607 to supported, patched versions of Windows 10 or Windows 11 to eliminate the vulnerability. 5. Implement rate limiting or throttling on Active Directory API requests where possible to mitigate resource exhaustion. 6. Conduct regular audits of legacy systems and decommission unsupported operating systems to reduce attack surface. 7. Prepare incident response plans specifically addressing denial of service scenarios targeting directory services. 8. Engage with Microsoft support channels for any available workarounds or early patches and subscribe to security advisories for timely updates.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- microsoft
- Date Reserved
- 2024-12-11T00:29:48.355Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69432f00058703ef3fc9801a
Added to database: 12/17/2025, 10:30:24 PM
Last enriched: 2/14/2026, 8:44:13 AM
Last updated: 3/25/2026, 4:35:55 AM
Views: 70
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.