CVE-2025-21351: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809
Windows Active Directory Domain Services API Denial of Service Vulnerability
AI Analysis
Technical Summary
CVE-2025-21351 is a vulnerability in Microsoft Windows 10 Version 1809 that affects the Active Directory Domain Services (AD DS) API. It is classified under CWE-400, which relates to uncontrolled resource consumption, commonly known as a denial of service (DoS) vulnerability. The flaw allows an unauthenticated remote attacker to send specially crafted requests to the AD DS API, causing excessive resource consumption that leads to service disruption. The vulnerability has a CVSS 3.1 base score of 7.5, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to availability (A:H), with no impact on confidentiality or integrity. The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component. No known exploits are currently reported in the wild, and no patches have been published at the time of analysis. The vulnerability was reserved in December 2024 and published in February 2025. Given the critical role of Active Directory in enterprise environments for authentication and authorization, exploitation could disrupt domain services, impacting user logins, group policy application, and other domain-dependent operations. This can cause significant operational downtime and productivity loss. The vulnerability’s remote exploitability without authentication makes it a serious concern for organizations still running Windows 10 Version 1809, which is an older but still in-use operating system version in many enterprises.
Potential Impact
For European organizations, the primary impact of CVE-2025-21351 is the potential denial of service of Active Directory Domain Services, which are central to identity and access management in most enterprises. Disruption of AD DS can halt user authentication, access to network resources, and enforcement of security policies, leading to operational paralysis. This can affect critical infrastructure, financial institutions, government agencies, and large enterprises that rely heavily on Windows-based networks. The unavailability of domain services can also delay incident response and recovery efforts. Since the vulnerability does not affect confidentiality or integrity, data breaches are less likely, but the operational impact can be severe. Organizations with legacy systems or delayed patching cycles are at higher risk. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time. The impact is amplified in sectors with high dependency on continuous domain service availability, such as healthcare, finance, and public administration.
Mitigation Recommendations
1. Prioritize upgrading affected systems from Windows 10 Version 1809 to a supported and patched version of Windows 10 or Windows 11, as Microsoft typically provides security fixes in newer releases. 2. Monitor network traffic and system resource usage on domain controllers for unusual spikes that could indicate exploitation attempts. 3. Implement network segmentation and firewall rules to restrict access to Active Directory services to trusted hosts and networks only. 4. Employ intrusion detection and prevention systems (IDS/IPS) with updated signatures to detect anomalous AD DS API requests. 5. Prepare incident response plans specifically for Active Directory service disruptions, including fallback authentication methods and rapid restoration procedures. 6. Stay alert for official patches or security advisories from Microsoft and apply them promptly once available. 7. Conduct regular security audits and vulnerability assessments focused on legacy systems to identify and remediate outdated software versions. 8. Consider deploying rate limiting or request throttling mechanisms on domain controllers to mitigate resource exhaustion attacks.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-21351: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809
Description
Windows Active Directory Domain Services API Denial of Service Vulnerability
AI-Powered Analysis
Technical Analysis
CVE-2025-21351 is a vulnerability in Microsoft Windows 10 Version 1809 that affects the Active Directory Domain Services (AD DS) API. It is classified under CWE-400, which relates to uncontrolled resource consumption, commonly known as a denial of service (DoS) vulnerability. The flaw allows an unauthenticated remote attacker to send specially crafted requests to the AD DS API, causing excessive resource consumption that leads to service disruption. The vulnerability has a CVSS 3.1 base score of 7.5, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to availability (A:H), with no impact on confidentiality or integrity. The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component. No known exploits are currently reported in the wild, and no patches have been published at the time of analysis. The vulnerability was reserved in December 2024 and published in February 2025. Given the critical role of Active Directory in enterprise environments for authentication and authorization, exploitation could disrupt domain services, impacting user logins, group policy application, and other domain-dependent operations. This can cause significant operational downtime and productivity loss. The vulnerability’s remote exploitability without authentication makes it a serious concern for organizations still running Windows 10 Version 1809, which is an older but still in-use operating system version in many enterprises.
Potential Impact
For European organizations, the primary impact of CVE-2025-21351 is the potential denial of service of Active Directory Domain Services, which are central to identity and access management in most enterprises. Disruption of AD DS can halt user authentication, access to network resources, and enforcement of security policies, leading to operational paralysis. This can affect critical infrastructure, financial institutions, government agencies, and large enterprises that rely heavily on Windows-based networks. The unavailability of domain services can also delay incident response and recovery efforts. Since the vulnerability does not affect confidentiality or integrity, data breaches are less likely, but the operational impact can be severe. Organizations with legacy systems or delayed patching cycles are at higher risk. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time. The impact is amplified in sectors with high dependency on continuous domain service availability, such as healthcare, finance, and public administration.
Mitigation Recommendations
1. Prioritize upgrading affected systems from Windows 10 Version 1809 to a supported and patched version of Windows 10 or Windows 11, as Microsoft typically provides security fixes in newer releases. 2. Monitor network traffic and system resource usage on domain controllers for unusual spikes that could indicate exploitation attempts. 3. Implement network segmentation and firewall rules to restrict access to Active Directory services to trusted hosts and networks only. 4. Employ intrusion detection and prevention systems (IDS/IPS) with updated signatures to detect anomalous AD DS API requests. 5. Prepare incident response plans specifically for Active Directory service disruptions, including fallback authentication methods and rapid restoration procedures. 6. Stay alert for official patches or security advisories from Microsoft and apply them promptly once available. 7. Conduct regular security audits and vulnerability assessments focused on legacy systems to identify and remediate outdated software versions. 8. Consider deploying rate limiting or request throttling mechanisms on domain controllers to mitigate resource exhaustion attacks.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- microsoft
- Date Reserved
- 2024-12-11T00:29:48.355Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69432f00058703ef3fc9801a
Added to database: 12/17/2025, 10:30:24 PM
Last enriched: 12/17/2025, 11:03:11 PM
Last updated: 2/7/2026, 11:04:12 AM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.