Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21351: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-21351cvecve-2025-21351cwe-400
Published: Tue Feb 11 2025 (02/11/2025, 17:58:08 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Active Directory Domain Services API Denial of Service Vulnerability

AI-Powered Analysis

AILast updated: 12/17/2025, 23:03:11 UTC

Technical Analysis

CVE-2025-21351 is a vulnerability in Microsoft Windows 10 Version 1809 that affects the Active Directory Domain Services (AD DS) API. It is classified under CWE-400, which relates to uncontrolled resource consumption, commonly known as a denial of service (DoS) vulnerability. The flaw allows an unauthenticated remote attacker to send specially crafted requests to the AD DS API, causing excessive resource consumption that leads to service disruption. The vulnerability has a CVSS 3.1 base score of 7.5, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to availability (A:H), with no impact on confidentiality or integrity. The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component. No known exploits are currently reported in the wild, and no patches have been published at the time of analysis. The vulnerability was reserved in December 2024 and published in February 2025. Given the critical role of Active Directory in enterprise environments for authentication and authorization, exploitation could disrupt domain services, impacting user logins, group policy application, and other domain-dependent operations. This can cause significant operational downtime and productivity loss. The vulnerability’s remote exploitability without authentication makes it a serious concern for organizations still running Windows 10 Version 1809, which is an older but still in-use operating system version in many enterprises.

Potential Impact

For European organizations, the primary impact of CVE-2025-21351 is the potential denial of service of Active Directory Domain Services, which are central to identity and access management in most enterprises. Disruption of AD DS can halt user authentication, access to network resources, and enforcement of security policies, leading to operational paralysis. This can affect critical infrastructure, financial institutions, government agencies, and large enterprises that rely heavily on Windows-based networks. The unavailability of domain services can also delay incident response and recovery efforts. Since the vulnerability does not affect confidentiality or integrity, data breaches are less likely, but the operational impact can be severe. Organizations with legacy systems or delayed patching cycles are at higher risk. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time. The impact is amplified in sectors with high dependency on continuous domain service availability, such as healthcare, finance, and public administration.

Mitigation Recommendations

1. Prioritize upgrading affected systems from Windows 10 Version 1809 to a supported and patched version of Windows 10 or Windows 11, as Microsoft typically provides security fixes in newer releases. 2. Monitor network traffic and system resource usage on domain controllers for unusual spikes that could indicate exploitation attempts. 3. Implement network segmentation and firewall rules to restrict access to Active Directory services to trusted hosts and networks only. 4. Employ intrusion detection and prevention systems (IDS/IPS) with updated signatures to detect anomalous AD DS API requests. 5. Prepare incident response plans specifically for Active Directory service disruptions, including fallback authentication methods and rapid restoration procedures. 6. Stay alert for official patches or security advisories from Microsoft and apply them promptly once available. 7. Conduct regular security audits and vulnerability assessments focused on legacy systems to identify and remediate outdated software versions. 8. Consider deploying rate limiting or request throttling mechanisms on domain controllers to mitigate resource exhaustion attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2024-12-11T00:29:48.355Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69432f00058703ef3fc9801a

Added to database: 12/17/2025, 10:30:24 PM

Last enriched: 12/17/2025, 11:03:11 PM

Last updated: 2/6/2026, 10:14:18 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats