Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59502: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-59502cvecve-2025-59502cwe-400
Published: Tue Oct 14 2025 (10/14/2025, 17:00:53 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Uncontrolled resource consumption in Windows Remote Procedure Call allows an unauthorized attacker to deny service over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 14:04:01 UTC

Technical Analysis

CVE-2025-59502 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw exists within the Windows Remote Procedure Call (RPC) service, a core component responsible for inter-process communication over a network. An unauthenticated attacker can exploit this vulnerability remotely by sending specially crafted RPC requests that cause the service to consume excessive system resources such as CPU, memory, or handles. This resource exhaustion can lead to denial-of-service conditions, including system slowdowns, crashes, or reboots, thereby impacting system availability. The CVSS v3.1 base score is 7.5, reflecting high severity due to the network attack vector, low attack complexity, no required privileges or user interaction, and the impact limited to availability. The vulnerability was reserved on September 17, 2025, and published on October 14, 2025. No patches or known exploits are currently available, indicating that mitigation relies on defensive controls and monitoring until an official fix is released. The vulnerability affects only Windows 10 Version 1809, an older Windows release still present in some enterprise and legacy environments. Given the critical role of RPC in Windows operations and the ease of exploitation, this vulnerability poses a significant risk to affected systems.

Potential Impact

The primary impact of CVE-2025-59502 is denial of service, which can disrupt business operations by causing affected Windows 10 Version 1809 systems to become unresponsive or crash. This can lead to downtime of critical services relying on these systems, impacting productivity and potentially causing financial losses. In environments where Windows 10 Version 1809 is used in critical infrastructure, healthcare, finance, or government sectors, the availability impact could have broader consequences, including service outages and operational disruptions. Since the vulnerability requires no authentication and can be exploited remotely, attackers can launch DoS attacks at scale, potentially targeting multiple systems simultaneously. Although confidentiality and integrity are not directly affected, the loss of availability can indirectly impact organizational security posture and trust. The lack of a patch at disclosure increases the window of exposure, making timely mitigation essential. Organizations with legacy systems or slow patch cycles are particularly vulnerable. The threat also raises concerns about potential future exploitation or integration into multi-stage attacks once exploit code becomes available.

Mitigation Recommendations

Until an official patch is released, organizations should implement specific mitigations to reduce risk from CVE-2025-59502. First, restrict inbound network access to the RPC service (typically TCP ports 135 and dynamic RPC ports) using firewalls and network segmentation to limit exposure to untrusted networks. Employ intrusion detection and prevention systems (IDS/IPS) with updated signatures to detect anomalous or malformed RPC traffic indicative of exploitation attempts. Monitor system resource usage and RPC service logs for unusual spikes or errors that may signal attack activity. Disable or limit RPC services on systems where they are not required, especially on endpoints exposed to the internet or untrusted networks. Apply strict network access controls and enforce least privilege principles to reduce attack surface. Prepare for rapid patch deployment by inventorying affected systems and testing updates in controlled environments. Educate IT staff about this vulnerability to ensure prompt detection and response. Additionally, consider deploying endpoint detection and response (EDR) solutions capable of identifying abnormal process behavior related to resource exhaustion. Maintain regular backups and incident response plans to minimize operational impact in case of successful attacks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-09-17T03:06:33.548Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee85913dd1bfb0b7e42afd

Added to database: 10/14/2025, 5:17:05 PM

Last enriched: 2/28/2026, 2:04:01 PM

Last updated: 3/24/2026, 8:19:10 AM

Views: 477

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses