7.8
CVSSv3

CVE-2025-29824

CVSSv4: NA | CVSSv3: 7.8 | CVSSv2: NA | VMScore: 880 | EPSS: 0.04442 | KEV: Exploitation Reported
Published: 08/04/2025 Updated: 09/04/2025

Vulnerability Summary

Windows Common Log File System Driver Use-After-Free Local Privilege Escalation

Use after free in Windows Common Log File System Driver allows an authorized malicious user to elevate privileges locally.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows 10 version 1809

microsoft windows server 2019

microsoft windows server 2019 (server core installation)

microsoft windows server 2022

microsoft windows 10 version 21h2

microsoft windows 11 version 22h2

microsoft windows 10 version 22h2

microsoft windows server 2025 (server core installation)

microsoft windows 11 version 22h3

microsoft windows 11 version 23h2

microsoft windows server 2022, 23h2 edition (server core installation)

microsoft windows 11 version 24h2

microsoft windows server 2025

microsoft windows 10 version 1507

microsoft windows 10 version 1607

microsoft windows server 2016

microsoft windows server 2016 (server core installation)

microsoft windows server 2008 service pack 2

microsoft windows server 2008 service pack 2 (server core installation)

microsoft windows server 2008 service pack 2

microsoft windows server 2008 r2 service pack 1

microsoft windows server 2008 r2 service pack 1 (server core installation)

microsoft windows server 2012

microsoft windows server 2012 (server core installation)

microsoft windows server 2012 r2

microsoft windows server 2012 r2 (server core installation)

microsoft windows 10 1809

microsoft windows 10 21H2

microsoft windows 11 22H2

microsoft windows 10 22H2

microsoft windows 11 23H2

microsoft windows server 23h2

microsoft windows 11 24H2

microsoft windows 10 1507

microsoft windows 10 1607

microsoft windows server 2008 sp2

microsoft windows server 2008 R2

microsoft windows server 2012 R2

Recent Articles

Microsoft April 2025 Patch Tuesday fixes exploited zero-day, 134 flaws
BleepingComputer • Lawrence Abrams • 08 Apr 2025

Microsoft April 2025 Patch Tuesday fixes exploited zero-day, 134 flaws By Lawrence Abrams April 8, 2025 01:50 PM 0 .crit { font-weight:bold; color:red; } .article_section td { font-size: 14px!important; } Today is Microsoft's April 2025 Patch Tuesday, which includes security updates for 134 flaws, including one actively exploited zero-day vulnerability. This Patch Tuesday also fixes eleven "Critical" vulnerabilities, all remote code execution vulnerabilities. The number of bugs in each vulnerabi...

Microsoft: Windows CLFS zero-day exploited by ransomware gang
BleepingComputer • Sergiu Gatlan • 08 Apr 2025

Microsoft: Windows CLFS zero-day exploited by ransomware gang By Sergiu Gatlan April 8, 2025 03:05 PM 0 Microsoft says the RansomEXX ransomware gang has been exploiting a high-severity zero-day flaw in the Windows Common Log File System to gain SYSTEM privileges on victims' systems. The vulnerability, tracked as CVE-2025-29824, was patched during this month's Patch Tuesday and was only exploited in a limited number of attacks. CVE-2025-29824 is due to a use-after-free weakness that lets local at...

Bad luck, Windows 10 users. No fix yet for ransomware-exploited bug
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources A novel way to encourage upgrades? Microsoft would never stoop so low

Patch Tuesday Patch Tuesday has arrived, and Microsoft has revealed one flaw in its products under active exploitation and 11 critical issues in its code to fix. Redmond delivered fixes for more than 120 flaws this month; none are rated with a CVSS severity score of nine or higher. The one that deserves most attention is CVE-2025-29824, an elevation of privilege (EoP) hole in the Windows Common Log File System Driver, because it is already being exploited. In a separate note, Microsoft explained...

April's Patch Tuesday leaves unlucky Windows Hello users unable to login
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Can't Redmond ask its whizz-bang Copilot AI to fix it? GitHub's boast that Copilot produces high-quality code challenged

Updated Those keen to get their Microsoft PCs patched up as soon as possible have been getting an unpleasant shock when they try to get in using Windows Hello. The patch bundle released yesterday is going to cause problems for a specific subset of users who are running either System Guard Secure Launch or Dynamic Root of Trust for Measurement (DRTM) on Windows 11 and Server 2025. If that's you, it's possible you'll need to reset your login PIN or biometrics in Hello in order to actually login an...