CVE-2025-26673: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809
Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network.
AI Analysis
Technical Summary
CVE-2025-26673 is a high-severity vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability resides in the Lightweight Directory Access Protocol (LDAP) implementation within this Windows version. An unauthorized attacker can exploit this flaw remotely over the network without requiring any privileges or user interaction. By sending specially crafted LDAP requests, the attacker can trigger excessive resource consumption on the target system, leading to denial of service (DoS). This resource exhaustion could manifest as CPU, memory, or other system resource depletion, causing the LDAP service or the entire system to become unresponsive or crash. The CVSS v3.1 base score is 7.5, indicating a high severity level, with attack vector being network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is limited to availability (A:H) with no confidentiality or integrity impact. There are no known exploits in the wild yet, and no patches have been linked at the time of publication. The vulnerability was reserved in February 2025 and published in April 2025. Given the critical role of LDAP in enterprise environments for authentication and directory services, this vulnerability poses a significant risk to systems running the affected Windows 10 version, especially in environments where LDAP traffic is exposed or accessible over the network.
Potential Impact
For European organizations, this vulnerability could disrupt critical directory services that rely on LDAP, such as Active Directory authentication, user management, and access control. Organizations using Windows 10 Version 1809 in their infrastructure, particularly in legacy systems or environments where upgrades have been delayed, are at risk of service outages. The denial of service could impact business continuity, causing downtime for internal applications and services dependent on LDAP. This could affect sectors with high reliance on Windows-based infrastructure, including government, finance, healthcare, and manufacturing. Additionally, the lack of confidentiality or integrity impact means data breaches are unlikely, but availability disruption can still cause significant operational and financial damage. The ease of exploitation without authentication or user interaction increases the threat level, especially if LDAP services are exposed to untrusted networks or insufficiently segmented internal networks. The absence of known exploits currently provides a window for mitigation before active attacks emerge.
Mitigation Recommendations
European organizations should prioritize identifying and inventorying systems running Windows 10 Version 1809, especially those exposing LDAP services. Immediate mitigation steps include: 1) Restricting LDAP access via network segmentation and firewall rules to trusted hosts only, minimizing exposure to untrusted networks. 2) Monitoring LDAP traffic for anomalous patterns indicative of resource exhaustion attempts. 3) Applying any available security updates or patches from Microsoft as soon as they are released. 4) If patching is not immediately possible, consider disabling or restricting LDAP services temporarily or implementing rate limiting on LDAP requests to prevent resource exhaustion. 5) Employing intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect exploitation attempts. 6) Planning for upgrade or migration from Windows 10 Version 1809 to supported, patched versions to reduce exposure to this and other vulnerabilities. 7) Conducting regular backups and ensuring incident response plans include scenarios for LDAP service disruption.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-26673: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809
Description
Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network.
AI-Powered Analysis
Technical Analysis
CVE-2025-26673 is a high-severity vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability resides in the Lightweight Directory Access Protocol (LDAP) implementation within this Windows version. An unauthorized attacker can exploit this flaw remotely over the network without requiring any privileges or user interaction. By sending specially crafted LDAP requests, the attacker can trigger excessive resource consumption on the target system, leading to denial of service (DoS). This resource exhaustion could manifest as CPU, memory, or other system resource depletion, causing the LDAP service or the entire system to become unresponsive or crash. The CVSS v3.1 base score is 7.5, indicating a high severity level, with attack vector being network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is limited to availability (A:H) with no confidentiality or integrity impact. There are no known exploits in the wild yet, and no patches have been linked at the time of publication. The vulnerability was reserved in February 2025 and published in April 2025. Given the critical role of LDAP in enterprise environments for authentication and directory services, this vulnerability poses a significant risk to systems running the affected Windows 10 version, especially in environments where LDAP traffic is exposed or accessible over the network.
Potential Impact
For European organizations, this vulnerability could disrupt critical directory services that rely on LDAP, such as Active Directory authentication, user management, and access control. Organizations using Windows 10 Version 1809 in their infrastructure, particularly in legacy systems or environments where upgrades have been delayed, are at risk of service outages. The denial of service could impact business continuity, causing downtime for internal applications and services dependent on LDAP. This could affect sectors with high reliance on Windows-based infrastructure, including government, finance, healthcare, and manufacturing. Additionally, the lack of confidentiality or integrity impact means data breaches are unlikely, but availability disruption can still cause significant operational and financial damage. The ease of exploitation without authentication or user interaction increases the threat level, especially if LDAP services are exposed to untrusted networks or insufficiently segmented internal networks. The absence of known exploits currently provides a window for mitigation before active attacks emerge.
Mitigation Recommendations
European organizations should prioritize identifying and inventorying systems running Windows 10 Version 1809, especially those exposing LDAP services. Immediate mitigation steps include: 1) Restricting LDAP access via network segmentation and firewall rules to trusted hosts only, minimizing exposure to untrusted networks. 2) Monitoring LDAP traffic for anomalous patterns indicative of resource exhaustion attempts. 3) Applying any available security updates or patches from Microsoft as soon as they are released. 4) If patching is not immediately possible, consider disabling or restricting LDAP services temporarily or implementing rate limiting on LDAP requests to prevent resource exhaustion. 5) Employing intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect exploitation attempts. 6) Planning for upgrade or migration from Windows 10 Version 1809 to supported, patched versions to reduce exposure to this and other vulnerabilities. 7) Conducting regular backups and ensuring incident response plans include scenarios for LDAP service disruption.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-02-12T22:35:41.549Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aebb59
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 7/11/2025, 4:01:58 AM
Last updated: 10/16/2025, 12:51:11 PM
Views: 51
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9955: Vulnerability in WSO2 WSO2 Enterprise Integrator
MediumCVE-2025-10611: Vulnerability in WSO2 WSO2 API Manager
CriticalCVE-2025-58426: Use of hard-coded cryptographic key in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-58079: Improper Protection of Alternate Path in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-55072: Cross-site scripting (XSS) in NEOJAPAN Inc. desknet's NEO
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.