CVE-2025-29954: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809
Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network.
AI Analysis
Technical Summary
CVE-2025-29954 is a vulnerability classified under CWE-400, indicating uncontrolled resource consumption, specifically affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability resides in the Lightweight Directory Access Protocol (LDAP) implementation within this Windows version. LDAP is a protocol widely used for directory services, including authentication and authorization in enterprise environments. This vulnerability allows an unauthorized attacker to remotely trigger excessive resource consumption over the network, leading to a denial of service (DoS) condition. The attacker does not require any privileges or user interaction to exploit this flaw, but the attack complexity is rated high, meaning some conditions or specific crafted requests are necessary to successfully trigger the resource exhaustion. The CVSS v3.1 base score is 5.9 (medium severity), reflecting that while confidentiality and integrity are not impacted, availability is significantly affected. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was publicly disclosed on May 13, 2025, with the issue reserved since March 12, 2025. Given the critical role of LDAP in enterprise authentication and directory services, this vulnerability can disrupt business operations by causing service outages or degraded performance in affected Windows 10 Version 1809 systems.
Potential Impact
For European organizations, the impact of CVE-2025-29954 can be substantial, especially for those relying on Windows 10 Version 1809 in their infrastructure. LDAP services are integral to identity management, access control, and network resource access. An attacker exploiting this vulnerability could cause denial of service conditions, leading to unavailability of authentication services, potentially locking out users and automated systems from critical resources. This disruption can affect productivity, business continuity, and compliance with regulations such as GDPR, which mandates availability and integrity of personal data processing systems. Sectors with high dependency on Windows 10 1809 and LDAP, such as government, finance, healthcare, and large enterprises, are particularly vulnerable. The medium CVSS score suggests that while the attack is not trivial, the lack of required privileges or user interaction lowers the barrier for attackers. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.
Mitigation Recommendations
1. Upgrade affected systems: The most effective mitigation is to upgrade Windows 10 systems from Version 1809 to a later, supported version where this vulnerability is patched or not present. 2. Network segmentation and filtering: Restrict LDAP traffic to trusted sources only, using firewalls and network access controls to limit exposure to potential attackers. 3. Monitor LDAP traffic: Implement monitoring and anomaly detection for LDAP requests to identify unusual patterns indicative of resource exhaustion attempts. 4. Apply rate limiting: Where possible, configure LDAP servers or network devices to limit the rate of incoming LDAP requests to prevent resource exhaustion. 5. Incident response readiness: Prepare response plans for potential denial of service incidents affecting LDAP services, including fallback authentication mechanisms. 6. Stay updated: Continuously monitor Microsoft advisories for patches or workarounds related to this CVE and apply them promptly once available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-29954: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809
Description
Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network.
AI-Powered Analysis
Technical Analysis
CVE-2025-29954 is a vulnerability classified under CWE-400, indicating uncontrolled resource consumption, specifically affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability resides in the Lightweight Directory Access Protocol (LDAP) implementation within this Windows version. LDAP is a protocol widely used for directory services, including authentication and authorization in enterprise environments. This vulnerability allows an unauthorized attacker to remotely trigger excessive resource consumption over the network, leading to a denial of service (DoS) condition. The attacker does not require any privileges or user interaction to exploit this flaw, but the attack complexity is rated high, meaning some conditions or specific crafted requests are necessary to successfully trigger the resource exhaustion. The CVSS v3.1 base score is 5.9 (medium severity), reflecting that while confidentiality and integrity are not impacted, availability is significantly affected. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was publicly disclosed on May 13, 2025, with the issue reserved since March 12, 2025. Given the critical role of LDAP in enterprise authentication and directory services, this vulnerability can disrupt business operations by causing service outages or degraded performance in affected Windows 10 Version 1809 systems.
Potential Impact
For European organizations, the impact of CVE-2025-29954 can be substantial, especially for those relying on Windows 10 Version 1809 in their infrastructure. LDAP services are integral to identity management, access control, and network resource access. An attacker exploiting this vulnerability could cause denial of service conditions, leading to unavailability of authentication services, potentially locking out users and automated systems from critical resources. This disruption can affect productivity, business continuity, and compliance with regulations such as GDPR, which mandates availability and integrity of personal data processing systems. Sectors with high dependency on Windows 10 1809 and LDAP, such as government, finance, healthcare, and large enterprises, are particularly vulnerable. The medium CVSS score suggests that while the attack is not trivial, the lack of required privileges or user interaction lowers the barrier for attackers. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.
Mitigation Recommendations
1. Upgrade affected systems: The most effective mitigation is to upgrade Windows 10 systems from Version 1809 to a later, supported version where this vulnerability is patched or not present. 2. Network segmentation and filtering: Restrict LDAP traffic to trusted sources only, using firewalls and network access controls to limit exposure to potential attackers. 3. Monitor LDAP traffic: Implement monitoring and anomaly detection for LDAP requests to identify unusual patterns indicative of resource exhaustion attempts. 4. Apply rate limiting: Where possible, configure LDAP servers or network devices to limit the rate of incoming LDAP requests to prevent resource exhaustion. 5. Incident response readiness: Prepare response plans for potential denial of service incidents affecting LDAP services, including fallback authentication mechanisms. 6. Stay updated: Continuously monitor Microsoft advisories for patches or workarounds related to this CVE and apply them promptly once available.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-03-12T17:54:45.706Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aeb986
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 9/10/2025, 3:16:47 AM
Last updated: 9/25/2025, 2:45:09 AM
Views: 22
Related Threats
CVE-2025-60164: CWE-352 Cross-Site Request Forgery (CSRF) in NewsMAN NewsmanApp
HighCVE-2025-59844: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in SonarSource sonarqube-scan-action
HighCVE-2025-11029: Cross-Site Request Forgery in givanz Vvveb
MediumCVE-2025-60165: CWE-862 Missing Authorization in HaruTheme Frames
MediumCVE-2025-60167: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in honzat Page Manager for Elementor
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.