CVE-2025-21207 Overview
CVE-2025-21207 is a Denial of Service vulnerability affecting the Windows Connected Devices Platform Service (Cdpsvc). This service is responsible for managing connections between Windows devices and connected peripherals, enabling features like Bluetooth pairing, device discovery, and cross-device experiences. An attacker can exploit this vulnerability remotely over the network without requiring authentication or user interaction, causing the service to become unresponsive and disrupting connected device functionality.
Critical Impact
This vulnerability allows unauthenticated remote attackers to disrupt the Windows Connected Devices Platform Service, affecting device connectivity, cross-device features, and potentially impacting business operations that rely on connected device functionality.
Affected Products
- Microsoft Windows 10 1809 (x64/x86)
- Microsoft Windows 10 21H2
- Microsoft Windows 10 22H2
- Microsoft Windows 11 22H2
- Microsoft Windows 11 23H2
- Microsoft Windows 11 24H2
- Microsoft Windows Server 2019
- Microsoft Windows Server 2022
- Microsoft Windows Server 2022 23H2
- Microsoft Windows Server 2025
Discovery Timeline
- January 14, 2025 - CVE-2025-21207 published to NVD
- January 27, 2025 - Last updated in NVD database
Technical Details for CVE-2025-21207
Vulnerability Analysis
This vulnerability is classified under CWE-400 (Uncontrolled Resource Consumption), indicating that the Windows Connected Devices Platform Service (Cdpsvc) fails to properly limit resource allocation when processing network requests. The Connected Devices Platform Service is a critical Windows component that runs as a system service and handles communication between the local machine and connected devices through various protocols.
The vulnerability can be exploited remotely across the network without requiring any privileges or user interaction, making it particularly dangerous in enterprise environments where Windows systems are exposed to network traffic. Successful exploitation results in resource exhaustion within the Cdpsvc service, causing it to become unresponsive and failing to process legitimate device connection requests.
Root Cause
The root cause of CVE-2025-21207 lies in improper resource management within the Connected Devices Platform Service. The service does not adequately validate or throttle incoming network requests, allowing an attacker to send specially crafted traffic that consumes excessive system resources. This uncontrolled resource consumption leads to service degradation or complete unavailability.
Attack Vector
The attack is conducted remotely over the network. An unauthenticated attacker can target systems running the vulnerable Cdpsvc service by sending malicious network traffic designed to exhaust service resources. The attack does not require any form of authentication or user interaction, meaning it can be automated and launched against multiple targets simultaneously.
The exploitation mechanism involves sending requests to the Connected Devices Platform Service that trigger excessive resource allocation. Because the service fails to implement proper rate limiting or resource caps, continued malicious traffic causes the service to become unresponsive, denying legitimate users access to connected device features.
Detection Methods for CVE-2025-21207
Indicators of Compromise
- Unexpected high CPU or memory utilization by the Cdpsvc.dll or svchost.exe processes hosting the Connected Devices Platform Service
- Service crashes or restarts for the Connected Devices Platform Service in Windows Event Logs
- Unusual network traffic patterns targeting ports associated with device discovery protocols
- User reports of connected devices becoming unresponsive or failing to pair
Detection Strategies
- Monitor Windows Event Logs for service failure events related to CDPSvc (Service Control Manager event ID 7031, 7034)
- Implement network traffic analysis to detect anomalous traffic patterns targeting Windows device discovery services
- Deploy endpoint detection rules that alert on resource exhaustion patterns in system services
- Use SentinelOne's behavioral AI to detect unusual service behavior indicative of DoS exploitation
Monitoring Recommendations
- Configure alerting for Cdpsvc service state changes and unexpected restarts
- Establish baseline resource utilization for the Connected Devices Platform Service and alert on significant deviations
- Monitor network traffic for volumetric attacks targeting Windows services
- Implement centralized logging for Windows system service events across the enterprise
How to Mitigate CVE-2025-21207
Immediate Actions Required
- Apply the latest Microsoft security updates from the January 2025 Patch Tuesday release immediately
- Prioritize patching on systems exposed to untrusted networks or internet-facing environments
- Review network segmentation to limit exposure of internal Windows systems to potential attackers
- Consider temporarily disabling the Connected Devices Platform Service on critical systems if device connectivity features are not required
Patch Information
Microsoft has released security updates addressing this vulnerability as part of their January 2025 security update cycle. Detailed patch information and download links are available in the Microsoft Security Response Center advisory. Organizations should prioritize deploying these updates across all affected Windows versions, including both client and server editions.
Workarounds
- Disable the Connected Devices Platform Service (CDPSvc) on systems where connected device features are not required using sc config CDPSvc start= disabled
- Implement network-level filtering to restrict access to the service from untrusted networks
- Use Windows Firewall rules to limit inbound connections to the service to only trusted sources
- Deploy network intrusion prevention systems to detect and block potential exploitation attempts
# Disable Connected Devices Platform Service (if device connectivity features are not needed)
sc config CDPSvc start= disabled
sc stop CDPSvc
# Verify service is stopped
sc query CDPSvc
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


