CVE-2025-53722: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809
Uncontrolled resource consumption in Windows Remote Desktop Services allows an unauthorized attacker to deny service over a network.
AI Analysis
Technical Summary
CVE-2025-53722 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting Microsoft Windows 10 Version 1809, specifically Remote Desktop Services (RDS). The flaw allows an unauthenticated attacker to send specially crafted network requests to RDS, causing excessive consumption of system resources such as CPU, memory, or network bandwidth. This resource exhaustion leads to a denial of service (DoS) condition, rendering the affected system unresponsive or unable to accept legitimate remote connections. The vulnerability has a CVSS v3.1 base score of 7.5, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is limited to availability (A:H) with no confidentiality or integrity loss. The vulnerability is publicly disclosed but currently has no known exploits in the wild. Windows 10 Version 1809 (build 10.0.17763.0) is the affected product version, which remains in use in many enterprise environments despite being superseded by newer releases. The absence of patches at the time of disclosure necessitates immediate mitigation strategies to reduce exposure. The vulnerability's nature allows attackers to disrupt critical remote access services, potentially impacting business continuity and operational capabilities.
Potential Impact
For European organizations, the primary impact is the potential disruption of remote desktop services, which are widely used for remote administration, teleworking, and access to critical systems. A successful attack could lead to denial of service, preventing legitimate users from accessing affected machines, thereby interrupting business operations and causing productivity losses. Sectors such as finance, healthcare, government, and critical infrastructure that rely heavily on Windows 10 RDS for remote management are particularly vulnerable. The disruption could also affect incident response and IT support capabilities, compounding operational risks. While no data confidentiality or integrity is compromised, the availability impact alone can have significant financial and reputational consequences. The ease of exploitation without authentication or user interaction increases the threat level, especially in environments with exposed RDP endpoints. Organizations with legacy systems still running Windows 10 Version 1809 face heightened risk until remediation is applied.
Mitigation Recommendations
European organizations should immediately audit their environment to identify systems running Windows 10 Version 1809 with Remote Desktop Services enabled. Until a patch is available, restrict RDP access using network-level controls such as VPNs, IP whitelisting, or firewall rules to limit exposure to trusted networks only. Enable Network Level Authentication (NLA) on RDS to add an additional layer of security. Monitor network traffic and system resource usage for anomalies indicative of resource exhaustion attacks. Employ rate limiting or connection throttling on RDP endpoints where possible. Consider disabling RDS on systems where it is not essential. Plan and prioritize upgrading affected systems to supported Windows versions with security updates. Stay alert for official patches or security advisories from Microsoft and apply them promptly upon release. Implement robust incident response procedures to quickly detect and mitigate potential DoS attempts targeting RDS.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-53722: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809
Description
Uncontrolled resource consumption in Windows Remote Desktop Services allows an unauthorized attacker to deny service over a network.
AI-Powered Analysis
Technical Analysis
CVE-2025-53722 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting Microsoft Windows 10 Version 1809, specifically Remote Desktop Services (RDS). The flaw allows an unauthenticated attacker to send specially crafted network requests to RDS, causing excessive consumption of system resources such as CPU, memory, or network bandwidth. This resource exhaustion leads to a denial of service (DoS) condition, rendering the affected system unresponsive or unable to accept legitimate remote connections. The vulnerability has a CVSS v3.1 base score of 7.5, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is limited to availability (A:H) with no confidentiality or integrity loss. The vulnerability is publicly disclosed but currently has no known exploits in the wild. Windows 10 Version 1809 (build 10.0.17763.0) is the affected product version, which remains in use in many enterprise environments despite being superseded by newer releases. The absence of patches at the time of disclosure necessitates immediate mitigation strategies to reduce exposure. The vulnerability's nature allows attackers to disrupt critical remote access services, potentially impacting business continuity and operational capabilities.
Potential Impact
For European organizations, the primary impact is the potential disruption of remote desktop services, which are widely used for remote administration, teleworking, and access to critical systems. A successful attack could lead to denial of service, preventing legitimate users from accessing affected machines, thereby interrupting business operations and causing productivity losses. Sectors such as finance, healthcare, government, and critical infrastructure that rely heavily on Windows 10 RDS for remote management are particularly vulnerable. The disruption could also affect incident response and IT support capabilities, compounding operational risks. While no data confidentiality or integrity is compromised, the availability impact alone can have significant financial and reputational consequences. The ease of exploitation without authentication or user interaction increases the threat level, especially in environments with exposed RDP endpoints. Organizations with legacy systems still running Windows 10 Version 1809 face heightened risk until remediation is applied.
Mitigation Recommendations
European organizations should immediately audit their environment to identify systems running Windows 10 Version 1809 with Remote Desktop Services enabled. Until a patch is available, restrict RDP access using network-level controls such as VPNs, IP whitelisting, or firewall rules to limit exposure to trusted networks only. Enable Network Level Authentication (NLA) on RDS to add an additional layer of security. Monitor network traffic and system resource usage for anomalies indicative of resource exhaustion attacks. Employ rate limiting or connection throttling on RDP endpoints where possible. Consider disabling RDS on systems where it is not essential. Plan and prioritize upgrading affected systems to supported Windows versions with security updates. Stay alert for official patches or security advisories from Microsoft and apply them promptly upon release. Implement robust incident response procedures to quickly detect and mitigate potential DoS attempts targeting RDS.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-07-09T03:10:34.737Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 689b774dad5a09ad00349206
Added to database: 8/12/2025, 5:18:05 PM
Last enriched: 11/14/2025, 7:27:06 AM
Last updated: 12/1/2025, 6:38:39 PM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-65407: n/a
UnknownCVE-2025-63365: n/a
UnknownCVE-2025-13837: Vulnerability in Python Software Foundation CPython
LowCVE-2025-13836: Vulnerability in Python Software Foundation CPython
MediumCVE-2025-13653: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in floragunn Search Guard FLX
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.