Skip to main content

CVE-2025-21389: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2025-21389cvecve-2025-21389cwe-400
Published: Tue Jan 14 2025 (01/14/2025, 18:04:11 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows upnphost.dll Denial of Service Vulnerability

AI-Powered Analysis

AILast updated: 09/10/2025, 00:07:04 UTC

Technical Analysis

CVE-2025-21389 is a high-severity vulnerability identified in Microsoft Windows 10 Version 1809, specifically affecting the upnphost.dll component. The vulnerability is categorized under CWE-400, which corresponds to uncontrolled resource consumption, commonly known as a denial of service (DoS) vulnerability. The affected version is Windows 10 build 17763.0. The vulnerability allows an unauthenticated attacker to remotely trigger excessive resource consumption without any user interaction, leading to a denial of service condition. The CVSS 3.1 base score is 7.5, indicating a high severity level. The attack vector is network-based (AV:N), requiring no privileges (PR:N) and no user interaction (UI:N), which means exploitation can be performed remotely and easily. The impact is limited to availability (A:H), with no confidentiality or integrity impact. The vulnerability arises from the upnphost.dll, which is responsible for handling Universal Plug and Play (UPnP) host services in Windows. An attacker can send specially crafted network requests that cause the system to consume excessive resources, such as CPU or memory, potentially leading to system slowdown or crash. No known exploits are reported in the wild yet, and no patches or mitigations have been linked in the provided data. This vulnerability is significant because Windows 10 Version 1809 is still in use in some environments, especially in legacy or industrial systems, and the ease of exploitation combined with the potential for service disruption makes it a critical concern for availability-dependent services.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to operational continuity, especially for those relying on Windows 10 Version 1809 in critical infrastructure, manufacturing, healthcare, or public services. A successful exploitation could lead to denial of service conditions, causing system outages or degraded performance. This can disrupt business operations, lead to financial losses, and impact service delivery. Since the vulnerability does not require authentication or user interaction, attackers can remotely target exposed systems over the network, increasing the attack surface. Organizations with legacy systems or delayed patching cycles are particularly vulnerable. Additionally, sectors with stringent uptime requirements, such as financial services and telecommunications, could face reputational damage and regulatory scrutiny if service disruptions occur. The lack of known exploits in the wild provides a window for proactive mitigation, but the high severity score underscores the urgency of addressing this issue.

Mitigation Recommendations

Given the absence of an official patch link, European organizations should implement immediate compensating controls to mitigate risk. These include: 1) Network-level filtering to block or restrict UPnP traffic (typically UDP ports 1900 and related TCP ports) from untrusted networks, especially the internet, to reduce exposure. 2) Disable UPnP services on Windows 10 Version 1809 systems where not required, using Group Policy or service management tools. 3) Employ intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection to identify and block suspicious UPnP traffic patterns indicative of exploitation attempts. 4) Monitor system resource usage closely on affected hosts to detect abnormal spikes that may indicate exploitation attempts. 5) Plan and prioritize upgrading affected systems to a supported and patched Windows version, as Windows 10 Version 1809 is an older release and may no longer receive security updates. 6) Implement network segmentation to isolate critical systems and limit lateral movement in case of compromise. 7) Maintain up-to-date backups and incident response plans to quickly recover from potential denial of service incidents.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-12-11T00:29:48.368Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c0bd539ed239a66badec53

Added to database: 9/9/2025, 11:50:43 PM

Last enriched: 9/10/2025, 12:07:04 AM

Last updated: 9/10/2025, 4:07:21 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats