CVE-2025-21289

7.5 HIGH

📋 TL;DR

This vulnerability in Microsoft Message Queuing (MSMQ) allows attackers to cause a denial of service by sending specially crafted packets to vulnerable systems. It affects Windows servers and workstations running MSMQ services. Successful exploitation could crash the MSMQ service, disrupting message processing capabilities.

💻 Affected Systems

Products:
  • Microsoft Message Queuing (MSMQ)
Versions: All supported Windows versions with MSMQ enabled
Operating Systems: Windows Server 2019, Windows Server 2022, Windows 10, Windows 11
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if MSMQ component is installed and enabled. MSMQ is not installed by default on most Windows systems.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete disruption of MSMQ services leading to application failures, business process interruptions, and potential cascading effects on dependent systems.

🟠

Likely Case

MSMQ service crashes requiring manual restart, causing temporary message processing delays and potential data loss for in-transit messages.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring allowing quick detection and service restoration.

🌐 Internet-Facing: MEDIUM - MSMQ services should not be internet-facing, but misconfigured systems could be exposed.
🏢 Internal Only: HIGH - Internal attackers or compromised internal systems could exploit this to disrupt critical messaging infrastructure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to MSMQ service port (typically TCP 1801). No authentication required to trigger the DoS condition.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply latest Windows security updates from Microsoft

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21289

Restart Required: Yes

Instructions:

1. Apply Windows security updates from Microsoft Update or WSUS. 2. Restart affected systems to complete installation. 3. Verify MSMQ service is running normally after restart.

🔧 Temporary Workarounds

Disable MSMQ Service

windows

Stop and disable MSMQ service if not required for business operations

sc stop MSMQ
sc config MSMQ start= disabled

Block MSMQ Ports

windows

Restrict network access to MSMQ service ports using firewall rules

netsh advfirewall firewall add rule name="Block MSMQ" dir=in action=block protocol=TCP localport=1801

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate MSMQ servers from untrusted networks
  • Deploy network monitoring and intrusion detection for MSMQ traffic anomalies

🔍 How to Verify

Check if Vulnerable:

Check if MSMQ service is installed and running: Get-WindowsFeature MSMQ* (PowerShell) or sc query MSMQ

Check Version:

wmic qfe list | findstr /C:"CVE-2025-21289" or Get-HotFix | Where-Object {$_.HotFixID -match "KB"}

Verify Fix Applied:

Verify Windows Update history contains the security patch and MSMQ service version matches patched release

📡 Detection & Monitoring

Log Indicators:

  • MSMQ service crash events in Windows System logs (Event ID 7031, 7034)
  • Unexpected MSMQ service restarts
  • High volume of connection attempts to port 1801

Network Indicators:

  • Unusual traffic patterns to MSMQ port 1801
  • Malformed MSMQ protocol packets
  • Multiple connection attempts from single sources

SIEM Query:

EventID=7031 OR EventID=7034 AND ServiceName="MSMQ" | stats count by SourceIP, DestinationIP

🔗 References

📤 Share & Export