PT-2025-15596 · Microsoft · Windows
Oruga
·
Published
2025-04-08
·
Updated
2025-10-15
·
CVE-2025-29824
CVSS v3.1
7.8
7.8
High
Base vector | Vector | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Microsoft Windows Common Log File System (CLFS) Driver versions prior to the fixed version
Description
The vulnerability is a use-after-free issue in the Windows Common Log File System (CLFS) Driver, which allows an authorized attacker to elevate privileges locally. This vulnerability has been exploited by ransomware groups, including Storm-2460 and RansomEXX, to gain SYSTEM-level access and deploy ransomware. The exploitation involves the use of the PipeMagic trojan and the creation of a malicious DLL file. The vulnerability affects various sectors, including IT, finance, and real estate, and has been used in targeted ransomware attacks.
Recommendations
To resolve the issue, update Microsoft Windows to the latest version, which includes the patch for the CLFS Driver vulnerability. Ensure that all systems are updated as soon as possible to prevent exploitation. Additionally, consider implementing security measures such as monitoring for suspicious activity, restricting access to sensitive data, and using anti-ransomware tools to detect and prevent attacks.
Exploit
Fix
LPE
RCE
Use After Free
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-03926
CVE-2025-29824
Affected Products
Windows
References · 430
- 🔥 https://vicarius.io/vsociety/posts/cve-2025-29824-windows-common-log-file-system-driver-elevation-of-privilege-vulnerability-detection-script · Exploit
- 🔥 https://vicarius.io/vsociety/posts/cve-2025-29824-windows-common-log-file-system-driver-elevation-of-privilege-vulnerability-mitigation-script · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2025-29824 · Security Note
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29824 · Vendor Advisory
- https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-29824 · Vendor Advisory
- https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29824 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-03926 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29824 · Security Note
- https://github.com/lencx/ChatGPT⭐ 54031 🔗 6150 · Note
- https://twitter.com/PCRuns4U/status/1918117276236059064 · Twitter Post
- https://twitter.com/f1tym1/status/1910581011810865663 · Twitter Post
- https://t.me/aptreports/18386 · Telegram Post
- https://twitter.com/dansantanna/status/1910814625836437767 · Twitter Post
- https://twitter.com/Kshitij_381/status/1909875295802606073 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1mw6q8u/top_10_trending_cves_21082025 · Reddit Post