Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26641: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1507

0
High
VulnerabilityCVE-2025-26641cvecve-2025-26641cwe-400
Published: Tue Apr 08 2025 (04/08/2025, 17:23:46 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Uncontrolled resource consumption in Windows Cryptographic Services allows an unauthorized attacker to deny service over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 09:08:23 UTC

Technical Analysis

CVE-2025-26641 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting Microsoft Windows 10 Version 1507 (build 10240). The flaw resides in the Windows Cryptographic Services component, which handles cryptographic operations essential for system security functions. An attacker can exploit this vulnerability remotely without requiring authentication or user interaction by sending specially crafted network requests that cause the service to consume excessive system resources such as CPU or memory. This resource exhaustion can degrade system performance or cause the service and potentially the entire system to become unresponsive, resulting in a denial of service (DoS). The vulnerability is notable because it affects a core Windows service and can be triggered over the network, increasing the attack surface. Although no public exploits are currently known, the vulnerability's high CVSS score (7.5) indicates a significant risk. The affected Windows 10 version 1507 is an early release from 2015, which is no longer supported by Microsoft, meaning no official patches may be available, increasing the importance of upgrading. The vulnerability’s impact is limited to availability, with no direct confidentiality or integrity compromise. The attack complexity is low, and no privileges or user interaction are required, making exploitation feasible in unpatched environments.

Potential Impact

For European organizations, the primary impact of CVE-2025-26641 is the potential for denial of service attacks that can disrupt critical services relying on Windows 10 Version 1507 systems. This could affect availability of networked applications, cryptographic operations, and dependent services, leading to operational downtime and potential financial losses. Organizations in sectors such as government, healthcare, finance, and critical infrastructure that may still operate legacy Windows 10 systems are particularly vulnerable. The disruption could also affect compliance with regulatory requirements for service availability and incident response. While the vulnerability does not compromise data confidentiality or integrity, the loss of availability can have cascading effects on business continuity and trust. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time. The absence of patches for this outdated OS version further exacerbates the risk for organizations that have not migrated to supported Windows versions.

Mitigation Recommendations

1. Immediate upgrade: European organizations should prioritize upgrading all Windows 10 Version 1507 systems to a supported and patched version of Windows 10 or later to eliminate exposure. 2. Network segmentation: Isolate legacy systems from critical network segments and limit exposure to untrusted networks to reduce attack surface. 3. Firewall rules: Implement strict firewall policies to block unnecessary inbound traffic targeting cryptographic services or related ports. 4. Monitoring and detection: Deploy network and host-based monitoring to detect unusual resource consumption patterns or service disruptions indicative of exploitation attempts. 5. Incident response planning: Prepare response procedures for potential DoS incidents affecting cryptographic services to minimize downtime. 6. Vendor engagement: Engage with Microsoft or trusted security vendors for any available workarounds or unofficial patches if upgrading immediately is not feasible. 7. Asset inventory: Maintain accurate inventories of legacy systems to identify and remediate vulnerable endpoints promptly. 8. User awareness: Inform IT staff about the vulnerability and signs of exploitation to enable rapid detection and response.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-02-12T19:23:29.269Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebb1f

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/14/2026, 9:08:23 AM

Last updated: 3/26/2026, 7:44:51 AM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses