Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-53722: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1507

0
High
VulnerabilityCVE-2025-53722cvecve-2025-53722cwe-400
Published: Tue Aug 12 2025 (08/12/2025, 17:10:27 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Uncontrolled resource consumption in Windows Remote Desktop Services allows an unauthorized attacker to deny service over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 10:48:11 UTC

Technical Analysis

CVE-2025-53722 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting Microsoft Windows 10 Version 1507 (build 10240). The flaw exists within the Remote Desktop Services component, where an attacker can send specially crafted requests over the network that cause the service to consume excessive system resources such as CPU, memory, or network bandwidth. This resource exhaustion leads to a denial of service (DoS) condition, rendering the affected system unresponsive or unable to provide Remote Desktop functionality. The vulnerability requires no authentication or user interaction, making it remotely exploitable by any attacker with network access to the service. The CVSS v3.1 base score is 7.5 (high), reflecting the ease of exploitation and the significant impact on availability, though confidentiality and integrity remain unaffected. The affected Windows 10 version 1507 is an early release from 2015, which is generally out of extended support, meaning patches may not be readily available. No known public exploits have been reported yet, but the potential for disruption exists, especially in environments where legacy systems remain in use. The vulnerability highlights the risks of running unsupported operating system versions with exposed Remote Desktop Services endpoints.

Potential Impact

For European organizations, the primary impact of CVE-2025-53722 is the potential for denial of service attacks against critical systems running Windows 10 Version 1507 with Remote Desktop Services enabled and accessible over the network. This can disrupt business operations, especially for organizations relying on Remote Desktop for remote administration, teleworking, or access to critical infrastructure. Availability loss can affect sectors such as finance, healthcare, manufacturing, and government services. Since the vulnerability does not compromise confidentiality or integrity, data breaches are unlikely; however, service outages can lead to operational downtime, financial losses, and reputational damage. Organizations using legacy Windows 10 systems without current security updates are particularly vulnerable. The lack of known exploits reduces immediate risk, but the ease of exploitation and absence of authentication requirements mean attackers could develop exploits rapidly. European entities with exposed Remote Desktop Services endpoints, especially those lacking network-level protections, face elevated risk.

Mitigation Recommendations

To mitigate CVE-2025-53722, European organizations should prioritize upgrading affected Windows 10 Version 1507 systems to supported and patched Windows versions to eliminate the vulnerability. Where immediate upgrades are not feasible, organizations should restrict network access to Remote Desktop Services using firewalls, VPNs, or network segmentation to limit exposure to trusted users only. Implementing Network Level Authentication (NLA) for Remote Desktop can add an additional layer of protection, although this vulnerability does not require authentication to exploit. Monitoring network traffic for unusual Remote Desktop connection attempts or resource usage spikes can help detect exploitation attempts early. Disabling Remote Desktop Services on systems where it is not required reduces the attack surface. Additionally, organizations should maintain up-to-date intrusion detection and prevention systems (IDS/IPS) configured to recognize anomalous Remote Desktop activity. Regularly auditing legacy systems and phasing out unsupported Windows versions will reduce long-term exposure to similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-07-09T03:10:34.737Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689b774dad5a09ad00349206

Added to database: 8/12/2025, 5:18:05 PM

Last enriched: 2/14/2026, 10:48:11 AM

Last updated: 3/22/2026, 1:08:31 PM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses