PT-2025-15596 · Microsoft · Windows
Oruga
·
Published
2025-04-08
·
Updated
2025-08-23
·
CVE-2025-29824
7.8
High
Base vector | Vector | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
## Vulnerability Description
**Name of the Vulnerable Software and Affected Versions:** Microsoft Windows versions prior to the April 2025 Patch Tuesday update.
**Description:**
A use-after-free vulnerability exists in the Windows Common Log File System (CLFS) Driver. This vulnerability allows an authorized attacker to elevate privileges locally, potentially gaining SYSTEM-level access. The vulnerability (CVE-2025-29824) was actively exploited by multiple threat actors, including the Storm-2460 group and the Play ransomware gang, prior to the release of a patch by Microsoft. Attackers leveraged the vulnerability in conjunction with malware such as PipeMagic and Grixba to deploy ransomware and steal sensitive information. The exploitation involved techniques like DLL hijacking and the use of malicious applications disguised as legitimate software. The vulnerability was exploited in attacks targeting organizations in the US, Venezuela, Spain, and Saudi Arabia.
Approximately 134 vulnerabilities were addressed in the April 2025 Patch Tuesday, including this zero-day flaw.
**Recommendations:**
Apply the April 2025 Patch Tuesday updates to mitigate this vulnerability. Review system logs for any signs of compromise. Harden public-facing infrastructure and deploy endpoint detection and response (EDR) solutions. Be cautious of free ChatGPT desktop applications and verify their source.
Exploit
Fix
RCE
LPE
Use After Free
Weakness Enumeration
Related Identifiers
Affected Products
References · 409
- 🔥 https://vicarius.io/vsociety/posts/cve-2025-29824-windows-common-log-file-system-driver-elevation-of-privilege-vulnerability-detection-script · Exploit
- 🔥 https://vicarius.io/vsociety/posts/cve-2025-29824-windows-common-log-file-system-driver-elevation-of-privilege-vulnerability-mitigation-script · Exploit
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29824 · Security Note
- https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-29824 · Vendor Advisory
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29824 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-03926 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-29824 · Security Note
- https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29824 · Vendor Advisory
- https://github.com/lencx/ChatGPT⭐ 54031 🔗 6150 · Note
- https://twitter.com/IT_news_for_all/status/1920067995109327154 · Twitter Post
- https://twitter.com/f1tym1/status/1957858812133552525 · Twitter Post
- https://twitter.com/DeepFlowcc/status/1910370041364914315 · Twitter Post
- https://twitter.com/storagetechnews/status/1932977214636650736 · Twitter Post
- https://twitter.com/feedly/status/1909727403401683294 · Twitter Post
- https://twitter.com/transilienceai/status/1909960910330081728 · Twitter Post