Skip to main content

CVE-2025-29954: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2025-29954cvecve-2025-29954cwe-400
Published: Tue May 13 2025 (05/13/2025, 16:59:04 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network.

AI-Powered Analysis

AILast updated: 09/10/2025, 03:16:47 UTC

Technical Analysis

CVE-2025-29954 is a vulnerability classified under CWE-400, indicating uncontrolled resource consumption, specifically affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability resides in the Lightweight Directory Access Protocol (LDAP) implementation within this Windows version. LDAP is a protocol widely used for directory services, including authentication and authorization in enterprise environments. This vulnerability allows an unauthorized attacker to remotely trigger excessive resource consumption over the network, leading to a denial of service (DoS) condition. The attacker does not require any privileges or user interaction to exploit this flaw, but the attack complexity is rated high, meaning some conditions or specific crafted requests are necessary to successfully trigger the resource exhaustion. The CVSS v3.1 base score is 5.9 (medium severity), reflecting that while confidentiality and integrity are not impacted, availability is significantly affected. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was publicly disclosed on May 13, 2025, with the issue reserved since March 12, 2025. Given the critical role of LDAP in enterprise authentication and directory services, this vulnerability can disrupt business operations by causing service outages or degraded performance in affected Windows 10 Version 1809 systems.

Potential Impact

For European organizations, the impact of CVE-2025-29954 can be substantial, especially for those relying on Windows 10 Version 1809 in their infrastructure. LDAP services are integral to identity management, access control, and network resource access. An attacker exploiting this vulnerability could cause denial of service conditions, leading to unavailability of authentication services, potentially locking out users and automated systems from critical resources. This disruption can affect productivity, business continuity, and compliance with regulations such as GDPR, which mandates availability and integrity of personal data processing systems. Sectors with high dependency on Windows 10 1809 and LDAP, such as government, finance, healthcare, and large enterprises, are particularly vulnerable. The medium CVSS score suggests that while the attack is not trivial, the lack of required privileges or user interaction lowers the barrier for attackers. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.

Mitigation Recommendations

1. Upgrade affected systems: The most effective mitigation is to upgrade Windows 10 systems from Version 1809 to a later, supported version where this vulnerability is patched or not present. 2. Network segmentation and filtering: Restrict LDAP traffic to trusted sources only, using firewalls and network access controls to limit exposure to potential attackers. 3. Monitor LDAP traffic: Implement monitoring and anomaly detection for LDAP requests to identify unusual patterns indicative of resource exhaustion attempts. 4. Apply rate limiting: Where possible, configure LDAP servers or network devices to limit the rate of incoming LDAP requests to prevent resource exhaustion. 5. Incident response readiness: Prepare response plans for potential denial of service incidents affecting LDAP services, including fallback authentication mechanisms. 6. Stay updated: Continuously monitor Microsoft advisories for patches or workarounds related to this CVE and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-03-12T17:54:45.706Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aeb986

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 9/10/2025, 3:16:47 AM

Last updated: 9/25/2025, 2:45:09 AM

Views: 22

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats