Skip to main content

CVE-2025-50172: CWE-770: Allocation of Resources Without Limits or Throttling in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2025-50172cvecve-2025-50172cwe-770
Published: Tue Aug 12 2025 (08/12/2025, 17:10:08 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Allocation of resources without limits or throttling in Windows DirectX allows an authorized attacker to deny service over a network.

AI-Powered Analysis

AILast updated: 09/04/2025, 01:12:23 UTC

Technical Analysis

CVE-2025-50172 is a resource allocation vulnerability identified in Microsoft Windows 10 Version 1809, specifically related to the Windows DirectX component. The vulnerability is classified under CWE-770, which concerns the allocation of resources without limits or throttling. This flaw allows an authorized attacker—meaning the attacker must have some level of legitimate access—to exploit the system by triggering excessive resource consumption through DirectX operations. Because there are no effective limits or throttling mechanisms in place, the attacker can cause resource exhaustion, leading to a denial of service (DoS) condition over a network. The vulnerability does not affect confidentiality or integrity but impacts availability by potentially rendering the system unresponsive or crashing critical services. The CVSS v3.1 base score is 6.5 (medium severity), with an attack vector of network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and unchanged scope (S:U). The exploitability is moderate since it requires some level of privilege but no user interaction, and no known exploits are reported in the wild as of the publication date. The affected version is Windows 10 Version 1809 (build 10.0.17763.0), a legacy version still in use in some environments. The lack of patch links suggests that a fix may not yet be publicly available or is pending release.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to availability. Organizations running Windows 10 Version 1809, especially those utilizing DirectX for graphical or multimedia applications, could experience service disruptions if an attacker exploits this flaw to exhaust system resources. This could impact critical business operations, particularly in sectors relying on real-time processing or graphical workloads such as media production, design, or certain industrial control systems. Since the attack requires some privilege, insider threats or compromised accounts could be leveraged to trigger the DoS. The network-based attack vector raises concerns for organizations with exposed services or remote access capabilities. Disruptions could lead to operational downtime, loss of productivity, and potential reputational damage. However, the lack of impact on confidentiality and integrity limits the risk of data breaches or unauthorized data modification. The medium severity rating reflects this focused impact on availability without broader system compromise.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first identify and inventory systems running Windows 10 Version 1809, prioritizing those with DirectX usage in critical environments. Since no patch is currently linked, organizations should monitor Microsoft security advisories closely for the release of an official update addressing CVE-2025-50172. In the interim, implement network-level controls to restrict access to systems running the vulnerable version, especially limiting access to trusted users and devices. Employ strict privilege management to reduce the number of accounts with the necessary privileges to exploit this vulnerability. Additionally, monitor system resource usage and DirectX-related processes for abnormal spikes that could indicate exploitation attempts. Consider deploying host-based intrusion detection systems (HIDS) or endpoint detection and response (EDR) solutions capable of alerting on unusual resource consumption patterns. For longer-term mitigation, plan and execute upgrades to supported Windows versions with active security support and patches. Finally, implement network segmentation to isolate critical systems and reduce the attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-06-13T18:35:16.736Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689b774bad5a09ad0034917e

Added to database: 8/12/2025, 5:18:03 PM

Last enriched: 9/4/2025, 1:12:23 AM

Last updated: 9/4/2025, 10:23:04 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats