
Research detected more dos defects
Safebuch researchers also discovered Cve-2025-26673 In DC’s Netalogon service, where the designed RPC calls can crash from a distance without authentication. By exploiting this weakness, the attackers can exclude an important Windows authentication component, potentially users can lock out of domain resources until the system is rebooted. Similarly, Cve-2025-49716 The Windows Local Security Authority targets the Subsistem Service (LSASS), enables a remote attacker to send a specially constituted LDAP query that destabilizes the service, causing immediate dos on the affected host.
Round the list of safbach Cve-2025-49722A DOS defect in Windows Print Spoiner. This bug can be triggered by sending perverted RPC requests that motivates to fail the spoler process, disrupt printing operations, and, in some cases, to affect the comprehensive system stability.
While Microsoft has decided through LDAPNIGHTMARE (CVE-2024-49113) and CVE-2025-32724 December 2024 And April 2025 Patch on Tuesday release, respectively, the remaining three safberch uncontrolled the flaws of the flaws. Microsoft did not immediately respond to CSO’s request for comments. To defend against WIN-DDOs and other DOS risks, apply the latest patch of Safebreach Microsoft, limit the DC service exposure, divide important systems and monitor for unusual LDAP or RPC or RPC traffic that quickly detect attacks.

