Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
LECS 320x100 1
Banner Desktop
Win-DoS Epidemic: New DoS and DDoS Attacks Start with Microsoft Windows

Win-DoS Epidemic: New DoS and DDoS Attacks Start with Microsoft Windows

11 August 2025 09:05

During the security conference DEF CON33, a team of industry specialists, Yair and Shahak Morag, from SafeBreach Labs, presented a novel category of denial-of-service (DoS) attacks they’ve dubbed the “Win-DoS Epidemic.” The research demonstrates how attackers can take down any Windows endpoint or server, including critical domain controllers (DCs), and even weaponize public DCs to create a large-scale DDoS botnet.

Their findings, which include four Windows DoS vulnerabilities and a Distributed Denial-of-Service (DDoS) attacks that can be activated without a click were presented by the two researchers. The discovered flaws, all classified as “uncontrolled resource consumption,” include:

  • CVE-2025-26673 (CVSS 7.5): A high severity denial of service vulnerability in Windows LDAP.
  • CVE-2025-32724 (CVSS 7.5):A high severity DoS vulnerability in Windows LSASS.
  • CVE-2025-49716 (CVSS 7.5): A High Severity DoS Vulnerability in Windows Netlogon.
  • CVE-2025-49722 (CVSS 5.7): A medium-severity DoS vulnerability in the Windows print spooler, requiring an authenticated attacker on an adjacent network.

A successful DoS attack against a DC can cripple an entire organization, making it impossible for users to log in, access resources, or perform daily operations. “Introducing the ‘Win-DoS Epidemic’: DoS tools that exploit four new zero-click Win-DoS vulnerabilities and one Win-DDoS! They crash any Windows endpoint/server, including DCs, or launch a botnet using public DCs for DDoS attacks. The epidemic has begun,” the researchers said.

Domain controllers form the backbone of most enterprise networks, handling authentication and centralizing user and resource management. The researchers’ work builds on their previous discovery, the LdapNightmare vulnerability (CVE-2024-49113), which was the first public DoS exploit for a Windows domain controller. The new findings significantly expand this threat, going beyond just LDAP to abuse other core Windows services.

This behavior allows an attacker to harness the immense power of tens of thousands of public DCs around the world, turning them into a massive, free, and untraceable DDoS botnet. The attack requires no special infrastructure and leaves no forensic traces, as the malicious activity originates from the compromised DCs, not the attacker’s computer.

The most alarming discovery is the new DDoS technique, which researchers have dubbed Win-DDoS. This attack exploits a flaw in the Windows LDAP client referral process. In normal operation, an LDAP referral directs a client to a different server to fulfill a request. Yair and Morag discovered that by manipulating this process, they could redirect DCs to a victim server, and crucially, they found a way to cause the DCs to incessantly repeat this redirection.

This technique represents a significant shift in DDoS attacks, enabling high-bandwidth, high-volume attacks without the typical costs or risks associated with setting up and maintaining a botnet.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Cropped RHC 3d Transp2 1766828557 300x300
The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.