Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27473: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1507

0
High
VulnerabilityCVE-2025-27473cvecve-2025-27473cwe-400
Published: Tue Apr 08 2025 (04/08/2025, 17:23:16 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Uncontrolled resource consumption in Windows HTTP.sys allows an unauthorized attacker to deny service over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 09:16:14 UTC

Technical Analysis

CVE-2025-27473 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting the HTTP.sys component in Microsoft Windows 10 Version 1507 (build 10.0.10240.0). HTTP.sys is a kernel-mode device driver that handles HTTP requests for the Windows operating system, serving as a core part of the HTTP stack. The vulnerability allows an unauthenticated remote attacker to send specially crafted HTTP requests that cause the system to consume excessive resources, such as CPU or memory, leading to a denial of service (DoS) condition. Because the flaw resides in a kernel-mode driver, the impact on system availability can be severe, potentially causing system crashes or making the system unresponsive. The CVSS v3.1 score of 7.5 reflects a high severity due to the ease of exploitation (network attack vector, no privileges or user interaction required) and the significant impact on availability. No confidentiality or integrity impact is noted. The vulnerability affects only the original release of Windows 10 (Version 1507), which is an outdated version no longer supported by Microsoft, meaning no official patches may be available. The lack of known exploits in the wild suggests it is either newly discovered or not yet weaponized, but the potential for DoS attacks remains high. The vulnerability was publicly disclosed on April 8, 2025, with reservation dating back to February 26, 2025. Given the critical role of HTTP.sys in handling web traffic and services, this vulnerability could disrupt web servers, APIs, or other HTTP-based services running on affected systems.

Potential Impact

For European organizations, the primary impact of CVE-2025-27473 is the risk of denial of service attacks that can disrupt critical services relying on Windows 10 Version 1507. This includes web servers, internal applications, and network services that utilize HTTP.sys. Service outages could affect business continuity, customer access, and operational processes, especially in sectors such as finance, healthcare, public administration, and critical infrastructure where availability is paramount. Since the vulnerability requires no authentication or user interaction, attackers can launch attacks remotely and anonymously, increasing the threat surface. Organizations still operating legacy Windows 10 systems are particularly vulnerable, as these systems may lack vendor support and security updates. The disruption could also have cascading effects on supply chains and interdependent services. Although no data breach or integrity compromise is expected, the availability impact alone can cause significant operational and reputational damage. European entities with stringent uptime requirements and regulatory obligations around service availability must prioritize addressing this vulnerability.

Mitigation Recommendations

The most effective mitigation is to upgrade affected systems from Windows 10 Version 1507 to a supported and patched version of Windows 10 or later. Since this version is out of mainstream support, organizations should plan migration strategies to modern OS versions that receive security updates. If upgrading immediately is not feasible, organizations should implement network-level protections such as firewall rules or intrusion prevention systems to restrict or rate-limit incoming HTTP traffic to vulnerable systems, reducing the risk of resource exhaustion. Monitoring HTTP.sys performance metrics and system resource usage can help detect early signs of exploitation attempts. Employing web application firewalls (WAFs) that can identify and block anomalous HTTP requests may also mitigate attack vectors. Additionally, isolating legacy systems from direct internet exposure and using VPNs or secure gateways for remote access can reduce attack surface. Organizations should stay alert for any patches or advisories from Microsoft and apply them promptly. Incident response plans should include procedures for DoS attack detection and mitigation to minimize downtime.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-02-26T14:42:05.976Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebb91

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/14/2026, 9:16:14 AM

Last updated: 3/26/2026, 8:11:17 AM

Views: 84

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses