CVE-2025-21389: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1507
Uncontrolled resource consumption in Windows Universal Plug and Play (UPnP) Device Host allows an unauthorized attacker to deny service over a network.
AI Analysis
Technical Summary
CVE-2025-21389 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) found in the Universal Plug and Play (UPnP) Device Host service of Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The vulnerability allows an unauthenticated remote attacker to send specially crafted network requests to the UPnP Device Host, causing it to consume excessive system resources such as CPU or memory. This resource exhaustion can lead to a denial of service (DoS) condition, rendering the affected system unresponsive or causing critical services to fail. The vulnerability has a CVSS v3.1 base score of 7.5, indicating high severity, with attack vector being network-based, no privileges or user interaction required, and no impact on confidentiality or integrity. The scope remains unchanged, meaning the attack affects only the vulnerable component without escalating privileges or affecting other components. The vulnerability was published on January 14, 2025, with no known exploits in the wild at the time of reporting. The affected product is an early release of Windows 10, which is now out of mainstream support, increasing the risk for organizations that have not upgraded. The UPnP service is commonly enabled by default on many Windows installations to facilitate device discovery and network configuration, making this vulnerability potentially widespread in legacy environments. The lack of a patch link suggests that a fix may not yet be available, emphasizing the importance of mitigation through configuration changes or system upgrades.
Potential Impact
For European organizations, the primary impact of CVE-2025-21389 is the potential for denial of service attacks that can disrupt business operations, especially in environments where Windows 10 Version 1507 is still in use. Critical infrastructure sectors such as energy, transportation, healthcare, and government agencies that rely on legacy Windows systems could experience service outages or degraded performance. The vulnerability does not compromise data confidentiality or integrity but can cause significant operational downtime, impacting availability of services and potentially leading to financial losses and reputational damage. Networked devices that depend on UPnP for automatic configuration are particularly vulnerable, and exploitation could be leveraged as part of larger attack campaigns to disrupt organizational networks. Given the ease of exploitation and lack of required authentication, attackers could launch widespread DoS attacks remotely, increasing the threat surface. Organizations with legacy systems that have not applied updates or migrated to supported Windows versions face heightened risk. Additionally, the absence of known exploits currently in the wild provides a window for proactive mitigation before active exploitation occurs.
Mitigation Recommendations
1. Upgrade all affected systems from Windows 10 Version 1507 to a supported and fully patched version of Windows 10 or later to eliminate the vulnerability. 2. If upgrading is not immediately possible, disable the Universal Plug and Play (UPnP) Device Host service on affected systems to prevent exploitation. This can be done via services.msc or through Group Policy for domain-joined machines. 3. Implement network-level controls such as firewall rules to restrict inbound and outbound UPnP traffic, especially from untrusted networks or the internet. 4. Monitor network traffic for unusual UPnP requests or spikes in resource usage that could indicate attempted exploitation. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics for UPnP-related DoS attempts. 6. Conduct an inventory of all Windows 10 Version 1507 systems within the organization to prioritize remediation efforts. 7. Educate IT staff about the risks associated with legacy Windows versions and the importance of timely patching and upgrades. 8. Coordinate with vendors and Microsoft support channels to obtain patches or workarounds if available. 9. Review and harden network segmentation to isolate legacy systems and limit potential attack propagation. 10. Establish incident response plans that include scenarios involving DoS attacks targeting UPnP services.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands, Belgium, Sweden, Austria
CVE-2025-21389: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1507
Description
Uncontrolled resource consumption in Windows Universal Plug and Play (UPnP) Device Host allows an unauthorized attacker to deny service over a network.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-21389 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) found in the Universal Plug and Play (UPnP) Device Host service of Microsoft Windows 10 Version 1507 (build 10.0.10240.0). The vulnerability allows an unauthenticated remote attacker to send specially crafted network requests to the UPnP Device Host, causing it to consume excessive system resources such as CPU or memory. This resource exhaustion can lead to a denial of service (DoS) condition, rendering the affected system unresponsive or causing critical services to fail. The vulnerability has a CVSS v3.1 base score of 7.5, indicating high severity, with attack vector being network-based, no privileges or user interaction required, and no impact on confidentiality or integrity. The scope remains unchanged, meaning the attack affects only the vulnerable component without escalating privileges or affecting other components. The vulnerability was published on January 14, 2025, with no known exploits in the wild at the time of reporting. The affected product is an early release of Windows 10, which is now out of mainstream support, increasing the risk for organizations that have not upgraded. The UPnP service is commonly enabled by default on many Windows installations to facilitate device discovery and network configuration, making this vulnerability potentially widespread in legacy environments. The lack of a patch link suggests that a fix may not yet be available, emphasizing the importance of mitigation through configuration changes or system upgrades.
Potential Impact
For European organizations, the primary impact of CVE-2025-21389 is the potential for denial of service attacks that can disrupt business operations, especially in environments where Windows 10 Version 1507 is still in use. Critical infrastructure sectors such as energy, transportation, healthcare, and government agencies that rely on legacy Windows systems could experience service outages or degraded performance. The vulnerability does not compromise data confidentiality or integrity but can cause significant operational downtime, impacting availability of services and potentially leading to financial losses and reputational damage. Networked devices that depend on UPnP for automatic configuration are particularly vulnerable, and exploitation could be leveraged as part of larger attack campaigns to disrupt organizational networks. Given the ease of exploitation and lack of required authentication, attackers could launch widespread DoS attacks remotely, increasing the threat surface. Organizations with legacy systems that have not applied updates or migrated to supported Windows versions face heightened risk. Additionally, the absence of known exploits currently in the wild provides a window for proactive mitigation before active exploitation occurs.
Mitigation Recommendations
1. Upgrade all affected systems from Windows 10 Version 1507 to a supported and fully patched version of Windows 10 or later to eliminate the vulnerability. 2. If upgrading is not immediately possible, disable the Universal Plug and Play (UPnP) Device Host service on affected systems to prevent exploitation. This can be done via services.msc or through Group Policy for domain-joined machines. 3. Implement network-level controls such as firewall rules to restrict inbound and outbound UPnP traffic, especially from untrusted networks or the internet. 4. Monitor network traffic for unusual UPnP requests or spikes in resource usage that could indicate attempted exploitation. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics for UPnP-related DoS attempts. 6. Conduct an inventory of all Windows 10 Version 1507 systems within the organization to prioritize remediation efforts. 7. Educate IT staff about the risks associated with legacy Windows versions and the importance of timely patching and upgrades. 8. Coordinate with vendors and Microsoft support channels to obtain patches or workarounds if available. 9. Review and harden network segmentation to isolate legacy systems and limit potential attack propagation. 10. Establish incident response plans that include scenarios involving DoS attacks targeting UPnP services.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2024-12-11T00:29:48.368Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c0bd539ed239a66badec53
Added to database: 9/9/2025, 11:50:43 PM
Last enriched: 2/14/2026, 8:31:28 AM
Last updated: 3/26/2026, 4:22:08 AM
Views: 172
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.