News

Windows has four vulnerabilities that can render any device with this system useless

The good news is that, once these problems are known, they can be solved as soon as possible

Windows has four vulnerabilities that can render any device with this system useless
Avatar of Softonic

Softonic

  • August 11, 2025
  • Updated: August 11, 2025 at 3:56 PM
Windows has four vulnerabilities that can render any device with this system useless

At the recent DEF CON 33 conference, researchers Yair and Shahak Morag from SafeBreach Labs presented a new and alarming class of denial of service (DoS) attacks, called Win-DoS Epidemic. This new research reveals four DoS vulnerabilities in Windows and a distributed denial of service (DDoS) threat that does not require clicks for activation. Attackers can paralyze critical systems, including Domain Controllers (DC), which could completely destabilize an organization.

A very serious problem to solve as soon as possible

DoS attacks focus on the uncontrolled consumption of resources, an approach that allows attackers to collapse any endpoint or Windows server. The most concerning technique, known as Win-DDoS, exploits a vulnerability in the Windows LDAP client reference process, allowing attackers to redirect DCs to a victim server and make them repeat that action indefinitely. This results in the creation of a massive and untraceable DDoS botnet, using public DCs around the world.

The implications of these findings are critical, as Domain Controllers are essential for authentication and resource management in organizational networks. A successful attack can mean that users are unable to access their resources, paralyzing daily operations. Additionally, researchers have identified three new DoS vulnerabilities that can be exploited without user interaction, affecting both servers and endpoints.

Despite Microsoft releasing patches for the LdapNightmare vulnerability, this new series of vulnerabilities emphasizes the need for organizations to review and strengthen their security postures, especially regarding internal systems like DCs. Continuous vigilance is essential to protect against these emerging threats.

Avast Free Antivirus DOWNLOAD

Latest Articles

Loading next article