CVE-2025-27473: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809
Uncontrolled resource consumption in Windows HTTP.sys allows an unauthorized attacker to deny service over a network.
AI Analysis
Technical Summary
CVE-2025-27473 is a high-severity vulnerability classified under CWE-400, which pertains to uncontrolled resource consumption. This vulnerability affects Microsoft Windows 10 Version 1809, specifically the HTTP.sys component, a kernel-mode device driver that handles HTTP protocol requests. The flaw allows an unauthorized attacker to send specially crafted network requests that cause excessive resource consumption within HTTP.sys, leading to a denial of service (DoS) condition. Since HTTP.sys operates at a low level in the Windows networking stack, exhaustion of its resources can severely impact system availability, potentially causing the affected system to become unresponsive or crash. The vulnerability requires no authentication or user interaction, and can be exploited remotely over the network, making it accessible to a wide range of attackers. The CVSS v3.1 base score of 7.5 reflects the high impact on availability, with no impact on confidentiality or integrity. No known exploits are currently reported in the wild, and no official patches have been linked yet, indicating that mitigation may rely on workarounds or network-level protections until a patch is released.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the availability of systems running Windows 10 Version 1809, particularly those exposing HTTP services directly to untrusted networks. Critical infrastructure, public sector services, and enterprises relying on legacy Windows 10 installations could face service disruptions if targeted. The denial of service could interrupt business operations, degrade user experience, and potentially cause cascading failures in dependent systems. Given that Windows 10 Version 1809 is an older release, some organizations may still be using it due to legacy application dependencies or delayed upgrade cycles, increasing their exposure. The lack of authentication requirement and remote exploitability means attackers can launch DoS attacks from anywhere, potentially impacting cloud-hosted services or on-premises servers accessible over the internet. This could also be leveraged as a distraction or component of a multi-stage attack. The absence of known exploits in the wild provides a window for proactive mitigation, but the high severity score demands urgent attention.
Mitigation Recommendations
European organizations should immediately identify and inventory all systems running Windows 10 Version 1809, especially those exposing HTTP services. Until an official patch is released, network-level mitigations such as filtering or rate-limiting HTTP traffic to vulnerable systems can reduce exposure. Deploying Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with signatures or heuristics to detect abnormal HTTP request patterns targeting HTTP.sys may help mitigate exploitation attempts. Organizations should accelerate migration plans to supported Windows versions where this vulnerability is not present or has been patched. Regular monitoring of network traffic and system performance indicators can help detect early signs of resource exhaustion. Additionally, segmenting vulnerable systems away from critical infrastructure and restricting inbound HTTP traffic to trusted sources can reduce attack surface. Once a patch becomes available, rapid deployment is essential. Finally, organizations should review and update incident response plans to include scenarios involving HTTP.sys DoS attacks.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Finland
CVE-2025-27473: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809
Description
Uncontrolled resource consumption in Windows HTTP.sys allows an unauthorized attacker to deny service over a network.
AI-Powered Analysis
Technical Analysis
CVE-2025-27473 is a high-severity vulnerability classified under CWE-400, which pertains to uncontrolled resource consumption. This vulnerability affects Microsoft Windows 10 Version 1809, specifically the HTTP.sys component, a kernel-mode device driver that handles HTTP protocol requests. The flaw allows an unauthorized attacker to send specially crafted network requests that cause excessive resource consumption within HTTP.sys, leading to a denial of service (DoS) condition. Since HTTP.sys operates at a low level in the Windows networking stack, exhaustion of its resources can severely impact system availability, potentially causing the affected system to become unresponsive or crash. The vulnerability requires no authentication or user interaction, and can be exploited remotely over the network, making it accessible to a wide range of attackers. The CVSS v3.1 base score of 7.5 reflects the high impact on availability, with no impact on confidentiality or integrity. No known exploits are currently reported in the wild, and no official patches have been linked yet, indicating that mitigation may rely on workarounds or network-level protections until a patch is released.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the availability of systems running Windows 10 Version 1809, particularly those exposing HTTP services directly to untrusted networks. Critical infrastructure, public sector services, and enterprises relying on legacy Windows 10 installations could face service disruptions if targeted. The denial of service could interrupt business operations, degrade user experience, and potentially cause cascading failures in dependent systems. Given that Windows 10 Version 1809 is an older release, some organizations may still be using it due to legacy application dependencies or delayed upgrade cycles, increasing their exposure. The lack of authentication requirement and remote exploitability means attackers can launch DoS attacks from anywhere, potentially impacting cloud-hosted services or on-premises servers accessible over the internet. This could also be leveraged as a distraction or component of a multi-stage attack. The absence of known exploits in the wild provides a window for proactive mitigation, but the high severity score demands urgent attention.
Mitigation Recommendations
European organizations should immediately identify and inventory all systems running Windows 10 Version 1809, especially those exposing HTTP services. Until an official patch is released, network-level mitigations such as filtering or rate-limiting HTTP traffic to vulnerable systems can reduce exposure. Deploying Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with signatures or heuristics to detect abnormal HTTP request patterns targeting HTTP.sys may help mitigate exploitation attempts. Organizations should accelerate migration plans to supported Windows versions where this vulnerability is not present or has been patched. Regular monitoring of network traffic and system performance indicators can help detect early signs of resource exhaustion. Additionally, segmenting vulnerable systems away from critical infrastructure and restricting inbound HTTP traffic to trusted sources can reduce attack surface. Once a patch becomes available, rapid deployment is essential. Finally, organizations should review and update incident response plans to include scenarios involving HTTP.sys DoS attacks.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-02-26T14:42:05.976Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aebb91
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 7/11/2025, 4:16:55 AM
Last updated: 8/11/2025, 9:33:37 PM
Views: 20
Related Threats
CVE-2025-49559: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE-22) in Adobe Adobe Commerce
MediumCVE-2025-49558: Time-of-check Time-of-use (TOCTOU) Race Condition (CWE-367) in Adobe Adobe Commerce
MediumCVE-2025-49557: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Commerce
HighCVE-2025-49556: Incorrect Authorization (CWE-863) in Adobe Adobe Commerce
HighCVE-2025-49555: Cross-Site Request Forgery (CSRF) (CWE-352) in Adobe Adobe Commerce
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.