CVE-2025-21352: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809
Internet Connection Sharing (ICS) Denial of Service Vulnerability
AI Analysis
Technical Summary
CVE-2025-21352 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting the Internet Connection Sharing (ICS) feature in Microsoft Windows 10 Version 1809 (build 10.0.17763.0). ICS allows a Windows device to share its internet connection with other devices on a local network. The vulnerability arises when ICS improperly manages resource allocation, allowing an unauthenticated remote attacker to trigger excessive resource consumption. This can lead to a denial of service (DoS) condition, where the affected system becomes unresponsive or its network sharing capabilities are disrupted. The CVSS 3.1 base score is 6.5, reflecting a medium severity level. The attack vector is adjacent network (AV:A), meaning the attacker must have access to the same local or adjacent network segment but does not require privileges or user interaction. The impact is limited to availability (A:H), with no confidentiality or integrity impact. The vulnerability was published on February 11, 2025, with no known exploits in the wild and no patches released at the time of analysis. The lack of authentication and user interaction requirements increases the risk, but the need for network proximity limits widespread exploitation. This vulnerability is particularly relevant for environments where ICS is enabled and used, such as small office/home office setups or enterprise networks that rely on ICS for connectivity sharing.
Potential Impact
For European organizations, the primary impact of CVE-2025-21352 is the potential disruption of network connectivity services due to denial of service on ICS-enabled Windows 10 Version 1809 systems. This can affect business continuity, especially in environments where ICS is used to provide internet access to multiple devices or critical network segments. The availability loss could lead to operational downtime, impacting productivity and potentially causing cascading effects in network-dependent services. While the vulnerability does not compromise data confidentiality or integrity, the disruption of network services could hinder communication, remote work, and access to cloud resources. Organizations in sectors such as manufacturing, healthcare, finance, and government, which often rely on stable network infrastructure, may experience significant operational challenges. The absence of known exploits reduces immediate risk, but the medium severity score and ease of triggering the vulnerability in adjacent networks necessitate proactive mitigation. Additionally, legacy systems still running Windows 10 Version 1809 without upgrades or patches are particularly vulnerable, increasing the attack surface in European enterprises with slower update cycles.
Mitigation Recommendations
1. Disable Internet Connection Sharing (ICS) on Windows 10 Version 1809 systems if it is not explicitly required for business operations. 2. Restrict network access to ICS services by implementing network segmentation and firewall rules that limit access to trusted devices within the local network. 3. Monitor network traffic and system resource usage on ICS-enabled devices to detect unusual spikes indicative of resource exhaustion attacks. 4. Prioritize upgrading affected systems to newer, supported Windows versions where this vulnerability is not present or has been patched. 5. Apply any forthcoming security patches from Microsoft promptly once available. 6. Educate IT staff about the vulnerability and ensure incident response plans include procedures for identifying and mitigating ICS-related DoS conditions. 7. Use network intrusion detection systems (NIDS) to identify potential exploitation attempts within local networks. 8. For critical environments, consider isolating ICS-enabled devices from sensitive network segments to minimize impact in case of exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-21352: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809
Description
Internet Connection Sharing (ICS) Denial of Service Vulnerability
AI-Powered Analysis
Technical Analysis
CVE-2025-21352 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting the Internet Connection Sharing (ICS) feature in Microsoft Windows 10 Version 1809 (build 10.0.17763.0). ICS allows a Windows device to share its internet connection with other devices on a local network. The vulnerability arises when ICS improperly manages resource allocation, allowing an unauthenticated remote attacker to trigger excessive resource consumption. This can lead to a denial of service (DoS) condition, where the affected system becomes unresponsive or its network sharing capabilities are disrupted. The CVSS 3.1 base score is 6.5, reflecting a medium severity level. The attack vector is adjacent network (AV:A), meaning the attacker must have access to the same local or adjacent network segment but does not require privileges or user interaction. The impact is limited to availability (A:H), with no confidentiality or integrity impact. The vulnerability was published on February 11, 2025, with no known exploits in the wild and no patches released at the time of analysis. The lack of authentication and user interaction requirements increases the risk, but the need for network proximity limits widespread exploitation. This vulnerability is particularly relevant for environments where ICS is enabled and used, such as small office/home office setups or enterprise networks that rely on ICS for connectivity sharing.
Potential Impact
For European organizations, the primary impact of CVE-2025-21352 is the potential disruption of network connectivity services due to denial of service on ICS-enabled Windows 10 Version 1809 systems. This can affect business continuity, especially in environments where ICS is used to provide internet access to multiple devices or critical network segments. The availability loss could lead to operational downtime, impacting productivity and potentially causing cascading effects in network-dependent services. While the vulnerability does not compromise data confidentiality or integrity, the disruption of network services could hinder communication, remote work, and access to cloud resources. Organizations in sectors such as manufacturing, healthcare, finance, and government, which often rely on stable network infrastructure, may experience significant operational challenges. The absence of known exploits reduces immediate risk, but the medium severity score and ease of triggering the vulnerability in adjacent networks necessitate proactive mitigation. Additionally, legacy systems still running Windows 10 Version 1809 without upgrades or patches are particularly vulnerable, increasing the attack surface in European enterprises with slower update cycles.
Mitigation Recommendations
1. Disable Internet Connection Sharing (ICS) on Windows 10 Version 1809 systems if it is not explicitly required for business operations. 2. Restrict network access to ICS services by implementing network segmentation and firewall rules that limit access to trusted devices within the local network. 3. Monitor network traffic and system resource usage on ICS-enabled devices to detect unusual spikes indicative of resource exhaustion attacks. 4. Prioritize upgrading affected systems to newer, supported Windows versions where this vulnerability is not present or has been patched. 5. Apply any forthcoming security patches from Microsoft promptly once available. 6. Educate IT staff about the vulnerability and ensure incident response plans include procedures for identifying and mitigating ICS-related DoS conditions. 7. Use network intrusion detection systems (NIDS) to identify potential exploitation attempts within local networks. 8. For critical environments, consider isolating ICS-enabled devices from sensitive network segments to minimize impact in case of exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- microsoft
- Date Reserved
- 2024-12-11T00:29:48.355Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69432f00058703ef3fc9801d
Added to database: 12/17/2025, 10:30:24 PM
Last enriched: 12/17/2025, 11:02:51 PM
Last updated: 12/20/2025, 2:25:24 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-7782: CWE-862 Missing Authorization in WP JobHunt
HighCVE-2025-7733: CWE-639 Authorization Bypass Through User-Controlled Key in WP JobHunt
MediumCVE-2025-14298: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in damian-gora FiboSearch – Ajax Search for WooCommerce
MediumCVE-2025-12492: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ultimatemember Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin
MediumCVE-2025-13619: CWE-269 Improper Privilege Management in CMSSuperHeroes Flex Store Users
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.