PT-2025-15596 · Microsoft · Windows
Oruga
·
Published
2025-04-08
·
Updated
2025-09-01
·
CVE-2025-29824
7.8
High
Base vector | Vector | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
**Name of the Vulnerable Software and Affected Versions:**
Microsoft Windows versions prior to the April 2025 security update.
**Description:**
A use-after-free vulnerability exists in the Windows Common Log File System (CLFS) Driver. This vulnerability allows an authorized attacker to elevate privileges locally, potentially gaining SYSTEM-level access. The vulnerability, tracked as CVE-2025-29824, was actively exploited in targeted attacks by the Storm-2460 threat actor, utilizing the PipeMagic malware and, in some cases, the Play and RansomExx ransomware families. Attackers leveraged various techniques, including the use of malicious MSI files, compromised Cisco Adaptive Security Appliances, and the exploitation of a zero-day flaw. The exploitation of this vulnerability allowed attackers to deploy malware, steal information, and gain control over compromised systems. Approximately an estimated number of organizations in the US, Venezuela, Spain, and Saudi Arabia were affected.
**Recommendations:**
Apply the April 2025 security update to mitigate this vulnerability. Monitor systems for suspicious activity, including unexpected process creation, LSASS access, and network connections. Be cautious of files from untrusted sources and ensure robust endpoint detection and response (EDR) capabilities are in place. Restrict access to potentially vulnerable modules and parameters where possible.
Exploit
Fix
RCE
LPE
Use After Free
Weakness Enumeration
Related Identifiers
Affected Products
References · 419
- 🔥 https://vicarius.io/vsociety/posts/cve-2025-29824-windows-common-log-file-system-driver-elevation-of-privilege-vulnerability-detection-script · Exploit
- 🔥 https://vicarius.io/vsociety/posts/cve-2025-29824-windows-common-log-file-system-driver-elevation-of-privilege-vulnerability-mitigation-script · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2025-29824 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29824 · Security Note
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29824 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-03926 · Security Note
- https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-29824 · Vendor Advisory
- https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29824 · Vendor Advisory
- https://github.com/lencx/ChatGPT⭐ 54031 🔗 6150 · Note
- https://twitter.com/NickBla41002745/status/1909961931248832728 · Twitter Post
- https://t.me/tmfeed/259430 · Telegram Post
- https://twitter.com/MertSARICA/status/1909939455349137674 · Twitter Post
- https://t.me/cvetracker/21164 · Telegram Post
- https://twitter.com/f1tym1/status/1957369288706179110 · Twitter Post
- https://twitter.com/transilienceai/status/1919541749501788609 · Twitter Post