CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Lifecycle Timeline
3Tags
Description
Protection mechanism failure in Windows DHCP Server allows an unauthorized attacker to deny service over a network.
Analysis
Protection mechanism failure in Windows DHCP Server that enables network-based denial-of-service attacks without requiring authentication or user interaction. An attacker can remotely exploit this vulnerability to render DHCP services unavailable, disrupting network connectivity for affected systems. The high CVSS score of 7.5 and network attack vector indicate significant availability impact, though no confidentiality or integrity compromise occurs.
Technical Context
This vulnerability resides in Windows DHCP Server (Dynamic Host Configuration Protocol), a critical network service responsible for automatic IP address allocation and network configuration distribution. The root cause is classified under CWE-693 (Protection Mechanism Failure), indicating insufficient validation or enforcement of security controls in the DHCP protocol implementation. The failure likely involves inadequate input validation, rate limiting, or request handling that allows an attacker to send specially crafted DHCP packets that crash the service or exhaust server resources. The attack vector is network-based (AV:N) with low attack complexity (AC:L), meaning exploitation requires no special network positioning or advanced techniques. The vulnerability affects Windows DHCP Server implementations across multiple versions; specific CPE strings would target microsoft:windows_server with DHCP role enabled.
Affected Products
Windows DHCP Server role on Windows Server editions (likely 2016, 2019, 2022 based on typical Microsoft support windows). Specific affected versions would be identified in Microsoft Security Advisory updates. The vulnerability affects systems with the DHCP Server role installed and listening on network interfaces. CPE likely includes: cpe:2.3:a:microsoft:dhcp_server:*:*:*:*:*:windows:*:* and related Windows Server platform CPEs. Check Microsoft Security Update Guide (portal.msrc.microsoft.com) for exact version ranges and affected builds.
Remediation
1) Apply the official Microsoft security patch immediately upon release (monitor Microsoft Security Response Center - MSRC). 2) If patching cannot be completed immediately, implement network-level mitigations: restrict DHCP server access via firewall rules to trusted clients only; disable DHCP services on internet-facing interfaces if possible. 3) Deploy DHCP relay agent filtering on network switches to validate DHCP traffic. 4) Monitor DHCP server logs for abnormal request patterns or service crashes. 5) Configure DHCP failover/redundancy to minimize availability impact if primary server is compromised. 6) Update intrusion detection/prevention systems to detect malformed DHCP packets matching this vulnerability signature once published. Patch availability and specific KB article numbers should be obtained from the official Microsoft Security Update Guide.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17745