Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-21351: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1607

0
High
VulnerabilityCVE-2025-21351cvecve-2025-21351cwe-400
Published: Tue Feb 11 2025 (02/11/2025, 17:58:08 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1607

Description

Windows Active Directory Domain Services API Denial of Service Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 08:44:13 UTC

Technical Analysis

CVE-2025-21351 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting Microsoft Windows 10 Version 1607 (build 10.0.14393.0). It specifically targets the Active Directory Domain Services API, a critical component responsible for directory services in Windows environments. The vulnerability allows an unauthenticated remote attacker to send crafted requests to the Active Directory API, causing excessive consumption of system resources such as memory or CPU. This resource exhaustion leads to a denial of service (DoS) condition, rendering the affected system or service unavailable to legitimate users. The CVSS v3.1 base score is 7.5 (high), indicating a network attack vector with low complexity, no privileges required, and no user interaction needed. The scope is unchanged, and the impact is limited to availability, with no confidentiality or integrity impact. No known exploits have been reported in the wild, and no official patches have been published as of the vulnerability disclosure date (February 11, 2025). The vulnerability is particularly concerning for environments running legacy Windows 10 1607 systems, which are often found in enterprise and government infrastructures that rely heavily on Active Directory for authentication and authorization services. The lack of patches and the ease of exploitation make this a significant risk for denial of service attacks that can disrupt business operations and critical services.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the availability of Active Directory services, which are foundational for identity management, authentication, and access control in enterprise networks. A successful denial of service attack could disrupt user logins, access to network resources, and overall IT operations, potentially halting business processes and critical infrastructure functions. Organizations still running Windows 10 Version 1607, especially in sectors such as government, finance, healthcare, and manufacturing, may face operational downtime and increased incident response costs. The inability to authenticate users or access directory services can also impact compliance with regulatory requirements such as GDPR, which mandates secure and reliable access controls. Since the vulnerability requires no authentication and no user interaction, attackers can exploit it remotely, increasing the risk of widespread disruption. The absence of patches further exacerbates the threat, forcing organizations to rely on compensating controls until updates are available.

Mitigation Recommendations

1. Immediately restrict network access to Active Directory Domain Services APIs by implementing strict firewall rules and network segmentation to limit exposure to untrusted networks. 2. Monitor system resource usage closely on Windows 10 Version 1607 systems, setting up alerts for unusual CPU or memory consumption patterns that may indicate exploitation attempts. 3. Employ intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics tuned to detect anomalous Active Directory API traffic. 4. Prioritize upgrading or migrating systems from Windows 10 Version 1607 to supported, patched versions of Windows 10 or Windows 11 to eliminate the vulnerability. 5. Implement rate limiting or throttling on Active Directory API requests where possible to mitigate resource exhaustion. 6. Conduct regular audits of legacy systems and decommission unsupported operating systems to reduce attack surface. 7. Prepare incident response plans specifically addressing denial of service scenarios targeting directory services. 8. Engage with Microsoft support channels for any available workarounds or early patches and subscribe to security advisories for timely updates.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2024-12-11T00:29:48.355Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69432f00058703ef3fc9801a

Added to database: 12/17/2025, 10:30:24 PM

Last enriched: 2/14/2026, 8:44:13 AM

Last updated: 3/25/2026, 4:35:55 AM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses