PT-2025-15596 · Microsoft · Windows
Oruga
·
Published
2025-04-08
·
Updated
2026-02-20
·
CVE-2025-29824
CVSS v3.1
7.8
7.8
High
| Base vector | Vector | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Microsoft Windows versions prior to April 2025 Patch Tuesday
Description
A use-after-free vulnerability exists in the Windows Common Log File System (CLFS) driver. Successful exploitation of this vulnerability allows an authorized attacker to elevate privileges to the SYSTEM level. This vulnerability (CVE-2025-29824) has been actively exploited by multiple threat actors, including the Play ransomware group and the Storm-2460 group, who have used it in conjunction with the PipeMagic malware. Attackers have leveraged this vulnerability to gain initial access, deploy information stealers, and achieve lateral movement within compromised networks. The exploitation has been observed across various sectors, including IT, finance, real estate, and government, in countries such as the United States, Venezuela, Saudi Arabia, and Brazil. The PipeMagic malware has been observed disguising itself as legitimate software, such as a ChatGPT desktop application, to evade detection.
Recommendations
Apply the April 2025 Patch Tuesday updates to address this vulnerability.
Exploit
Fix
RCE
LPE
Use After Free
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-03926
CVE-2025-29824
Affected Products
Windows
References · 440
- 🔥 https://vicarius.io/vsociety/posts/cve-2025-29824-windows-common-log-file-system-driver-elevation-of-privilege-vulnerability-mitigation-script · Exploit
- 🔥 https://vicarius.io/vsociety/posts/cve-2025-29824-windows-common-log-file-system-driver-elevation-of-privilege-vulnerability-detection-script · Exploit
- https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29824 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-29824 · Security Note
- https://bdu.fstec.ru/vul/2025-03926 · Security Note
- https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-29824 · Vendor Advisory
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29824 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29824 · Security Note
- https://github.com/lencx/ChatGPT⭐ 54031 🔗 6150 · Note
- https://twitter.com/PureVPNcom/status/1958100737545634156 · Twitter Post
- https://twitter.com/cybrhoodsentinl/status/1957501652325527886 · Twitter Post
- https://reddit.com/r/ImpMSNews/comments/1julgwf/windows_11_kb5055523_kb5055528_april_2025_patch · Reddit Post
- https://twitter.com/f1tym1/status/1958170828912124180 · Twitter Post
- https://twitter.com/AgencePdn/status/1910407438211170330 · Twitter Post
- https://twitter.com/littlenewsnetwk/status/1910025719515668832 · Twitter Post