Skip to main content

CVE-2025-27473: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2025-27473cvecve-2025-27473cwe-400
Published: Tue Apr 08 2025 (04/08/2025, 17:23:16 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Uncontrolled resource consumption in Windows HTTP.sys allows an unauthorized attacker to deny service over a network.

AI-Powered Analysis

AILast updated: 07/11/2025, 04:16:55 UTC

Technical Analysis

CVE-2025-27473 is a high-severity vulnerability classified under CWE-400, which pertains to uncontrolled resource consumption. This vulnerability affects Microsoft Windows 10 Version 1809, specifically the HTTP.sys component, a kernel-mode device driver that handles HTTP protocol requests. The flaw allows an unauthorized attacker to send specially crafted network requests that cause excessive resource consumption within HTTP.sys, leading to a denial of service (DoS) condition. Since HTTP.sys operates at a low level in the Windows networking stack, exhaustion of its resources can severely impact system availability, potentially causing the affected system to become unresponsive or crash. The vulnerability requires no authentication or user interaction, and can be exploited remotely over the network, making it accessible to a wide range of attackers. The CVSS v3.1 base score of 7.5 reflects the high impact on availability, with no impact on confidentiality or integrity. No known exploits are currently reported in the wild, and no official patches have been linked yet, indicating that mitigation may rely on workarounds or network-level protections until a patch is released.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the availability of systems running Windows 10 Version 1809, particularly those exposing HTTP services directly to untrusted networks. Critical infrastructure, public sector services, and enterprises relying on legacy Windows 10 installations could face service disruptions if targeted. The denial of service could interrupt business operations, degrade user experience, and potentially cause cascading failures in dependent systems. Given that Windows 10 Version 1809 is an older release, some organizations may still be using it due to legacy application dependencies or delayed upgrade cycles, increasing their exposure. The lack of authentication requirement and remote exploitability means attackers can launch DoS attacks from anywhere, potentially impacting cloud-hosted services or on-premises servers accessible over the internet. This could also be leveraged as a distraction or component of a multi-stage attack. The absence of known exploits in the wild provides a window for proactive mitigation, but the high severity score demands urgent attention.

Mitigation Recommendations

European organizations should immediately identify and inventory all systems running Windows 10 Version 1809, especially those exposing HTTP services. Until an official patch is released, network-level mitigations such as filtering or rate-limiting HTTP traffic to vulnerable systems can reduce exposure. Deploying Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with signatures or heuristics to detect abnormal HTTP request patterns targeting HTTP.sys may help mitigate exploitation attempts. Organizations should accelerate migration plans to supported Windows versions where this vulnerability is not present or has been patched. Regular monitoring of network traffic and system performance indicators can help detect early signs of resource exhaustion. Additionally, segmenting vulnerable systems away from critical infrastructure and restricting inbound HTTP traffic to trusted sources can reduce attack surface. Once a patch becomes available, rapid deployment is essential. Finally, organizations should review and update incident response plans to include scenarios involving HTTP.sys DoS attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-02-26T14:42:05.976Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebb91

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/11/2025, 4:16:55 AM

Last updated: 8/11/2025, 9:33:37 PM

Views: 20

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats