Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-53722: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-53722cvecve-2025-53722cwe-400
Published: Tue Aug 12 2025 (08/12/2025, 17:10:27 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Uncontrolled resource consumption in Windows Remote Desktop Services allows an unauthorized attacker to deny service over a network.

AI-Powered Analysis

AILast updated: 11/14/2025, 07:27:06 UTC

Technical Analysis

CVE-2025-53722 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting Microsoft Windows 10 Version 1809, specifically Remote Desktop Services (RDS). The flaw allows an unauthenticated attacker to send specially crafted network requests to RDS, causing excessive consumption of system resources such as CPU, memory, or network bandwidth. This resource exhaustion leads to a denial of service (DoS) condition, rendering the affected system unresponsive or unable to accept legitimate remote connections. The vulnerability has a CVSS v3.1 base score of 7.5, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is limited to availability (A:H) with no confidentiality or integrity loss. The vulnerability is publicly disclosed but currently has no known exploits in the wild. Windows 10 Version 1809 (build 10.0.17763.0) is the affected product version, which remains in use in many enterprise environments despite being superseded by newer releases. The absence of patches at the time of disclosure necessitates immediate mitigation strategies to reduce exposure. The vulnerability's nature allows attackers to disrupt critical remote access services, potentially impacting business continuity and operational capabilities.

Potential Impact

For European organizations, the primary impact is the potential disruption of remote desktop services, which are widely used for remote administration, teleworking, and access to critical systems. A successful attack could lead to denial of service, preventing legitimate users from accessing affected machines, thereby interrupting business operations and causing productivity losses. Sectors such as finance, healthcare, government, and critical infrastructure that rely heavily on Windows 10 RDS for remote management are particularly vulnerable. The disruption could also affect incident response and IT support capabilities, compounding operational risks. While no data confidentiality or integrity is compromised, the availability impact alone can have significant financial and reputational consequences. The ease of exploitation without authentication or user interaction increases the threat level, especially in environments with exposed RDP endpoints. Organizations with legacy systems still running Windows 10 Version 1809 face heightened risk until remediation is applied.

Mitigation Recommendations

European organizations should immediately audit their environment to identify systems running Windows 10 Version 1809 with Remote Desktop Services enabled. Until a patch is available, restrict RDP access using network-level controls such as VPNs, IP whitelisting, or firewall rules to limit exposure to trusted networks only. Enable Network Level Authentication (NLA) on RDS to add an additional layer of security. Monitor network traffic and system resource usage for anomalies indicative of resource exhaustion attacks. Employ rate limiting or connection throttling on RDP endpoints where possible. Consider disabling RDS on systems where it is not essential. Plan and prioritize upgrading affected systems to supported Windows versions with security updates. Stay alert for official patches or security advisories from Microsoft and apply them promptly upon release. Implement robust incident response procedures to quickly detect and mitigate potential DoS attempts targeting RDS.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-07-09T03:10:34.737Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689b774dad5a09ad00349206

Added to database: 8/12/2025, 5:18:05 PM

Last enriched: 11/14/2025, 7:27:06 AM

Last updated: 12/1/2025, 6:38:39 PM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats