Skip to main content

CVE-2025-26641: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2025-26641cvecve-2025-26641cwe-400
Published: Tue Apr 08 2025 (04/08/2025, 17:23:46 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Uncontrolled resource consumption in Windows Cryptographic Services allows an unauthorized attacker to deny service over a network.

AI-Powered Analysis

AILast updated: 07/11/2025, 03:46:32 UTC

Technical Analysis

CVE-2025-26641 is a high-severity vulnerability classified under CWE-400, which pertains to uncontrolled resource consumption. This vulnerability affects Microsoft Windows 10 Version 1809 (build 10.0.17763.0) specifically within the Windows Cryptographic Services component. The flaw allows an unauthorized attacker to remotely trigger excessive consumption of system resources, leading to a denial of service (DoS) condition. The attack vector is network-based, requiring no privileges or user interaction, making exploitation relatively straightforward. The vulnerability does not impact confidentiality or integrity but severely affects availability by exhausting resources such as CPU, memory, or handles, causing the Cryptographic Services or the entire system to become unresponsive or crash. No public exploits are currently known, and no patches have been released as of the publication date (April 8, 2025). The CVSS v3.1 score is 7.5, reflecting the high impact on availability combined with ease of exploitation over the network without authentication or user interaction.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on Windows 10 Version 1809 in critical infrastructure, enterprise environments, or public sector systems. Cryptographic Services are fundamental for secure communications, certificate management, and authentication processes. A successful DoS attack could disrupt these services, leading to downtime, loss of productivity, and potential cascading failures in dependent applications or services. Organizations in sectors such as finance, healthcare, government, and telecommunications could face operational disruptions and service outages. Additionally, since the attack requires no authentication and can be launched remotely, it increases the risk of widespread disruption, potentially affecting interconnected networks and cloud services hosted on vulnerable systems.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement specific mitigations beyond generic advice: 1) Network-level protections: Deploy intrusion detection and prevention systems (IDS/IPS) with signatures or heuristics to detect anomalous traffic patterns targeting Cryptographic Services. 2) Network segmentation: Isolate systems running Windows 10 Version 1809 from untrusted networks, especially the internet, to reduce exposure. 3) Limit exposure of vulnerable systems by disabling unnecessary network services and restricting inbound traffic to trusted sources only. 4) Monitor system resource usage closely on affected endpoints to detect early signs of resource exhaustion. 5) Plan and prioritize upgrading or patching vulnerable systems as soon as Microsoft releases a fix. 6) Employ rate limiting or connection throttling on network devices to mitigate potential flooding attacks targeting the vulnerability. 7) Maintain up-to-date backups and incident response plans to quickly recover from potential DoS incidents.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-02-12T19:23:29.269Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebb1f

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/11/2025, 3:46:32 AM

Last updated: 8/18/2025, 11:33:36 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats