Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49722: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809

0
Medium
VulnerabilityCVE-2025-49722cvecve-2025-49722cwe-400
Published: Tue Jul 08 2025 (07/08/2025, 16:58:09 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Uncontrolled resource consumption in Windows Print Spooler Components allows an authorized attacker to deny service over an adjacent network.

AI-Powered Analysis

AILast updated: 08/26/2025, 01:08:37 UTC

Technical Analysis

CVE-2025-49722 is a medium-severity vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability resides in the Windows Print Spooler components, which are responsible for managing print jobs and printer interactions. An authorized attacker with local privileges on an adjacent network can exploit this flaw to trigger excessive resource consumption, leading to a denial-of-service (DoS) condition. Specifically, the attacker can cause the Print Spooler service to consume excessive CPU, memory, or other system resources, thereby degrading system performance or causing the service to crash. This results in the inability of legitimate users to print or use related services, impacting availability. The attack vector requires adjacent network access, meaning the attacker must be on the same local network segment or connected via a VPN or similar means. No user interaction is required once the attacker has the necessary privileges. The CVSS v3.1 base score is 5.7, reflecting a medium severity with the following metrics: Attack Vector (Adjacent Network), Attack Complexity (Low), Privileges Required (Low), User Interaction (None), Scope (Unchanged), Confidentiality (None), Integrity (None), and Availability (High). There are currently no known exploits in the wild, and no patches have been linked yet, indicating that mitigation may rely on workarounds or limiting access until an official fix is released.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to availability of printing services within corporate or institutional networks that still operate Windows 10 Version 1809 systems. Printing remains a critical function in many sectors including government, healthcare, manufacturing, and finance. A successful exploitation could disrupt business operations by denying printing capabilities, potentially delaying workflows and causing operational inefficiencies. While the vulnerability does not impact confidentiality or integrity, the denial of service could indirectly affect compliance with regulatory requirements that mandate availability of certain services. Additionally, organizations with segmented networks or strict access controls may be less exposed, but those with flat or poorly segmented networks could see broader impact. Since the attack requires adjacent network access and low privileges, insider threats or compromised devices within the local network pose a realistic risk vector. The lack of known exploits reduces immediate risk, but the absence of patches means organizations must remain vigilant.

Mitigation Recommendations

1. Network Segmentation: Restrict access to print spooler services by segmenting networks and limiting adjacent network access to trusted devices only. 2. Access Control: Enforce strict access controls and monitor accounts with low privileges that can interact with the print spooler. 3. Disable Print Spooler Service: Where printing is not essential, disable the Print Spooler service on Windows 10 Version 1809 systems to eliminate the attack surface. 4. Apply Workarounds: Monitor Microsoft security advisories for any recommended workarounds or temporary mitigations until an official patch is released. 5. Monitoring and Logging: Enable detailed logging of print spooler activity and network connections to detect unusual resource consumption patterns indicative of exploitation attempts. 6. Upgrade Path: Plan and expedite upgrading affected systems to supported Windows versions with security patches, as Windows 10 Version 1809 is an older release with limited support. 7. Insider Threat Management: Implement user behavior analytics and endpoint detection to identify potential insider threats or compromised devices that could exploit this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-06-09T21:23:11.522Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686d50d76f40f0eb72f91c88

Added to database: 7/8/2025, 5:09:43 PM

Last enriched: 8/26/2025, 1:08:37 AM

Last updated: 11/20/2025, 1:33:00 AM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats