Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59502: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2025-59502cvecve-2025-59502cwe-400
Published: Tue Oct 14 2025 (10/14/2025, 17:00:53 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Uncontrolled resource consumption in Windows Remote Procedure Call allows an unauthorized attacker to deny service over a network.

AI-Powered Analysis

AILast updated: 11/27/2025, 03:36:14 UTC

Technical Analysis

CVE-2025-59502 is a vulnerability categorized under CWE-400 (Uncontrolled Resource Consumption) found in the Windows Remote Procedure Call (RPC) service of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw allows an unauthenticated attacker to send specially crafted network requests to the RPC service, causing it to consume excessive system resources such as CPU, memory, or network bandwidth. This resource exhaustion can lead to a denial of service (DoS) condition, rendering the affected system unresponsive or causing service interruptions. The vulnerability has a CVSS v3.1 base score of 7.5, indicating high severity. The attack vector is network-based (AV:N), requires no privileges (PR:N) or user interaction (UI:N), and impacts availability (A:H) without affecting confidentiality or integrity. The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component or system. No patches or exploits are currently publicly available, but the vulnerability is officially published and reserved since September 2025. The lack of authentication requirements and ease of exploitation make this a significant threat, especially for environments still running Windows 10 Version 1809, which is an older but still in-use OS version in many enterprises.

Potential Impact

For European organizations, the primary impact of CVE-2025-59502 is the potential for denial of service attacks that can disrupt critical business operations, especially those relying on Windows 10 Version 1809 systems. This could affect availability of services, internal applications, and networked resources dependent on RPC. Industries such as finance, healthcare, manufacturing, and government agencies that use legacy Windows 10 systems are particularly vulnerable. Disruptions could lead to operational downtime, loss of productivity, and potential financial losses. Additionally, critical infrastructure relying on Windows 10 endpoints or servers could face service outages, impacting public services and safety. Since the vulnerability requires no authentication or user interaction, attackers could launch widespread network-based attacks, increasing the risk of large-scale disruptions in enterprise and public sector networks across Europe.

Mitigation Recommendations

1. Immediate mitigation should include network-level controls such as firewall rules to restrict inbound RPC traffic to trusted sources only, minimizing exposure to untrusted networks. 2. Employ network intrusion detection and prevention systems (IDS/IPS) to monitor and block suspicious RPC traffic patterns indicative of resource exhaustion attempts. 3. Where possible, isolate or segment legacy Windows 10 Version 1809 systems from critical network segments to limit attack surface. 4. Prioritize upgrading affected systems to a supported and patched Windows version as Microsoft releases security updates addressing this vulnerability. 5. Implement rate limiting on RPC endpoints to prevent excessive request flooding. 6. Conduct regular monitoring of system resource utilization to detect abnormal spikes that may indicate exploitation attempts. 7. Maintain up-to-date asset inventories to identify all systems running the vulnerable OS version for targeted remediation. 8. Educate IT staff on recognizing and responding to potential DoS incidents related to RPC resource exhaustion.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-09-17T03:06:33.548Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee85913dd1bfb0b7e42afd

Added to database: 10/14/2025, 5:17:05 PM

Last enriched: 11/27/2025, 3:36:14 AM

Last updated: 12/5/2025, 4:37:07 AM

Views: 243

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats