CVE-2025-59502: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809
Uncontrolled resource consumption in Windows Remote Procedure Call allows an unauthorized attacker to deny service over a network.
AI Analysis
Technical Summary
CVE-2025-59502 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw exists within the Windows Remote Procedure Call (RPC) service, a core component responsible for inter-process communication over a network. An unauthenticated attacker can exploit this vulnerability remotely by sending specially crafted RPC requests that cause the service to consume excessive system resources such as CPU, memory, or handles. This resource exhaustion can lead to denial-of-service conditions, including system slowdowns, crashes, or reboots, thereby impacting system availability. The CVSS v3.1 base score is 7.5, reflecting high severity due to the network attack vector, low attack complexity, no required privileges or user interaction, and the impact limited to availability. The vulnerability was reserved on September 17, 2025, and published on October 14, 2025. No patches or known exploits are currently available, indicating that mitigation relies on defensive controls and monitoring until an official fix is released. The vulnerability affects only Windows 10 Version 1809, an older Windows release still present in some enterprise and legacy environments. Given the critical role of RPC in Windows operations and the ease of exploitation, this vulnerability poses a significant risk to affected systems.
Potential Impact
The primary impact of CVE-2025-59502 is denial of service, which can disrupt business operations by causing affected Windows 10 Version 1809 systems to become unresponsive or crash. This can lead to downtime of critical services relying on these systems, impacting productivity and potentially causing financial losses. In environments where Windows 10 Version 1809 is used in critical infrastructure, healthcare, finance, or government sectors, the availability impact could have broader consequences, including service outages and operational disruptions. Since the vulnerability requires no authentication and can be exploited remotely, attackers can launch DoS attacks at scale, potentially targeting multiple systems simultaneously. Although confidentiality and integrity are not directly affected, the loss of availability can indirectly impact organizational security posture and trust. The lack of a patch at disclosure increases the window of exposure, making timely mitigation essential. Organizations with legacy systems or slow patch cycles are particularly vulnerable. The threat also raises concerns about potential future exploitation or integration into multi-stage attacks once exploit code becomes available.
Mitigation Recommendations
Until an official patch is released, organizations should implement specific mitigations to reduce risk from CVE-2025-59502. First, restrict inbound network access to the RPC service (typically TCP ports 135 and dynamic RPC ports) using firewalls and network segmentation to limit exposure to untrusted networks. Employ intrusion detection and prevention systems (IDS/IPS) with updated signatures to detect anomalous or malformed RPC traffic indicative of exploitation attempts. Monitor system resource usage and RPC service logs for unusual spikes or errors that may signal attack activity. Disable or limit RPC services on systems where they are not required, especially on endpoints exposed to the internet or untrusted networks. Apply strict network access controls and enforce least privilege principles to reduce attack surface. Prepare for rapid patch deployment by inventorying affected systems and testing updates in controlled environments. Educate IT staff about this vulnerability to ensure prompt detection and response. Additionally, consider deploying endpoint detection and response (EDR) solutions capable of identifying abnormal process behavior related to resource exhaustion. Maintain regular backups and incident response plans to minimize operational impact in case of successful attacks.
Affected Countries
United States, China, India, Germany, United Kingdom, France, Japan, South Korea, Canada, Australia, Brazil, Russia, Italy
CVE-2025-59502: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809
Description
Uncontrolled resource consumption in Windows Remote Procedure Call allows an unauthorized attacker to deny service over a network.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-59502 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw exists within the Windows Remote Procedure Call (RPC) service, a core component responsible for inter-process communication over a network. An unauthenticated attacker can exploit this vulnerability remotely by sending specially crafted RPC requests that cause the service to consume excessive system resources such as CPU, memory, or handles. This resource exhaustion can lead to denial-of-service conditions, including system slowdowns, crashes, or reboots, thereby impacting system availability. The CVSS v3.1 base score is 7.5, reflecting high severity due to the network attack vector, low attack complexity, no required privileges or user interaction, and the impact limited to availability. The vulnerability was reserved on September 17, 2025, and published on October 14, 2025. No patches or known exploits are currently available, indicating that mitigation relies on defensive controls and monitoring until an official fix is released. The vulnerability affects only Windows 10 Version 1809, an older Windows release still present in some enterprise and legacy environments. Given the critical role of RPC in Windows operations and the ease of exploitation, this vulnerability poses a significant risk to affected systems.
Potential Impact
The primary impact of CVE-2025-59502 is denial of service, which can disrupt business operations by causing affected Windows 10 Version 1809 systems to become unresponsive or crash. This can lead to downtime of critical services relying on these systems, impacting productivity and potentially causing financial losses. In environments where Windows 10 Version 1809 is used in critical infrastructure, healthcare, finance, or government sectors, the availability impact could have broader consequences, including service outages and operational disruptions. Since the vulnerability requires no authentication and can be exploited remotely, attackers can launch DoS attacks at scale, potentially targeting multiple systems simultaneously. Although confidentiality and integrity are not directly affected, the loss of availability can indirectly impact organizational security posture and trust. The lack of a patch at disclosure increases the window of exposure, making timely mitigation essential. Organizations with legacy systems or slow patch cycles are particularly vulnerable. The threat also raises concerns about potential future exploitation or integration into multi-stage attacks once exploit code becomes available.
Mitigation Recommendations
Until an official patch is released, organizations should implement specific mitigations to reduce risk from CVE-2025-59502. First, restrict inbound network access to the RPC service (typically TCP ports 135 and dynamic RPC ports) using firewalls and network segmentation to limit exposure to untrusted networks. Employ intrusion detection and prevention systems (IDS/IPS) with updated signatures to detect anomalous or malformed RPC traffic indicative of exploitation attempts. Monitor system resource usage and RPC service logs for unusual spikes or errors that may signal attack activity. Disable or limit RPC services on systems where they are not required, especially on endpoints exposed to the internet or untrusted networks. Apply strict network access controls and enforce least privilege principles to reduce attack surface. Prepare for rapid patch deployment by inventorying affected systems and testing updates in controlled environments. Educate IT staff about this vulnerability to ensure prompt detection and response. Additionally, consider deploying endpoint detection and response (EDR) solutions capable of identifying abnormal process behavior related to resource exhaustion. Maintain regular backups and incident response plans to minimize operational impact in case of successful attacks.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-09-17T03:06:33.548Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ee85913dd1bfb0b7e42afd
Added to database: 10/14/2025, 5:17:05 PM
Last enriched: 2/28/2026, 2:04:01 PM
Last updated: 3/24/2026, 8:19:10 AM
Views: 477
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.