CVE-2025-21313

6.5 MEDIUM

📋 TL;DR

This vulnerability in Windows Security Account Manager (SAM) allows attackers to cause a denial of service condition by sending specially crafted requests. It affects Windows systems with SAM enabled, potentially disrupting authentication services and system availability.

💻 Affected Systems

Products:
  • Windows Security Account Manager
Versions: Specific Windows versions as detailed in Microsoft advisory
Operating Systems: Windows Server, Windows Client versions
Default Config Vulnerable: ⚠️ Yes
Notes: Systems with SAM service enabled are vulnerable; domain controllers and systems using local SAM databases are particularly at risk

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system unavailability requiring reboot, disruption of authentication services preventing user logins and access to resources

🟠

Likely Case

Temporary service disruption affecting authentication and authorization processes, requiring system restart to restore functionality

🟢

If Mitigated

Minimal impact with proper network segmentation and access controls limiting exposure to attack vectors

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires network access to SAM service and knowledge of vulnerable endpoints; authentication may be required depending on configuration

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Microsoft's monthly security updates for specific KB numbers

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21313

Restart Required: Yes

Instructions:

1. Apply latest Windows security updates from Microsoft Update 2. Install specific KB patch referenced in advisory 3. Restart system to complete installation

🔧 Temporary Workarounds

Network Segmentation

windows

Restrict network access to SAM service ports (typically 445/TCP) using firewall rules

netsh advfirewall firewall add rule name="Block SAM Access" dir=in action=block protocol=TCP localport=445

Service Hardening

windows

Configure SAM service with reduced privileges and implement access controls

sc config SamSs start= delayed-auto
sc failure SamSs reset= 86400 actions= restart/60000/restart/120000

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate SAM services from untrusted networks
  • Deploy intrusion detection/prevention systems to monitor for SAM exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check Windows version and compare against affected versions in Microsoft advisory

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify Windows Update history contains the relevant security patch KB number

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4625 (failed logons) with unusual patterns
  • SAM service crashes in System logs
  • High volume of authentication requests from single sources

Network Indicators:

  • Unusual SMB traffic patterns targeting port 445
  • Multiple failed authentication attempts followed by service disruption

SIEM Query:

source="windows" event_id=4625 OR event_id=6008 | stats count by src_ip dest_ip

🔗 References

📤 Share & Export