CVE-2025-29824

ENISA EUVD: EUVD-2025-10122 ↗
Exploited in the Wild ✓ Confirmed 0-Day ★ Google Project Zero
Triaged: March 3, 2026 10 articles Published: 2025-04-08

EPSS Score

Source: FIRST.org · 2026-05-23
0.95%
probability
This CVE has a 0.95% probability of being exploited in the next 30 days.
0% Top 76.6th percentile of all CVEs 100%

CVSS v3.1

Source: VulnerabilityLookup (CIRCL)
7.8
HIGH
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Temporal
Exploit Code Maturity
Functional
Remediation Level
Official Fix
Report Confidence
Confirmed
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

Description

NVD
Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.

Affected Products

Microsoft
Windows 10 Version 1507
10.0.10240.0
Microsoft
Windows 10 Version 1607
10.0.14393.0
Microsoft
Windows 10 Version 1809
10.0.17763.0
Microsoft
Windows 10 Version 21H2
10.0.19044.0
Microsoft
Windows 10 Version 22H2
10.0.19045.0

Attack Intelligence

Google Project Zero

Patched
April 8, 2025
Reported by
Microsoft Threat Intelligence Center
Root Cause Analysis
???

Exploits & PoC

AfanPan/CVE-2025-29824-Exploit

Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.

21 2025-07-30
3 repos — triés par ⭐ Rechercher sur GitHub ↗

Signal Intelligence

Confidence
92%
EPSS 0.95%
CVSS v3.1 7.8
Mentions 10
Last Seen May 07, 2025

CNA Information

CNA Assigner
microsoft
CNA Title
Windows Common Log File System Driver Elevation of Privilege Vulnerability

Analyst Note

This CVE is confirmed as exploited in active ransomware campaigns by Play and other threat actors, with coverage from reputable sources including BleepingComputer and CERT-EU advisory confirmation. The presence in Google Project Zero and documented real-world exploitation of the Windows CLFS use-after-free vulnerability substantiate the confirmed status despite not yet appearing in CISA's KEV catalog.

Threat Actors 30

Cobalt
apt_group Financial crime 🇷🇺 RU
APT 28
apt_group Information theft and espionage 🇷🇺 RU
Hacking Team
apt_group 🇮🇹 IT
SCATTERED SPIDER
apt_group Financial crime 🇺🇸 US
The Shadow Brokers
apt_group 🇷🇺 RU
Infy
apt_group Information theft and espionage 🇮🇷 IR
Group 27
apt_group Information theft and espionage 🇨🇳 CN
[Unnamed group]
apt_group 🇨🇳 CN
RomCom
apt_group Financial gain 🇷🇺 RU
UNC5174
apt_group 🇨🇳 CN
Returned Libra
apt_group 🇨🇳 CN
APT 22
apt_group Information theft and espionage 🇨🇳 CN
Rocke
apt_group 🇨🇳 CN
APT 6
apt_group Information theft and espionage 🇨🇳 CN
SOLAR SPIDER
apt_group 🇨🇳 CN
RevengeHotels
apt_group Information theft and espionage 🇧🇷 BR
Red October
apt_group 🇷🇺 RU
The White Company
apt_group Information theft and espionage 🇨🇳 CN
Circles
apt_group Global
Pat Bear
apt_group 🇸🇾 SY
Unnamed Actor
apt_group 🇨🇳 CN
Shadow Network
apt_group Information theft and espionage 🇨🇳 CN
Mana Team
apt_group 🇨🇳 CN
UNION SPIDER
apt_group 🇷🇺 RU
APT 5
apt_group Information theft and espionage 🇨🇳 CN
Cyber Alliance
apt_group 🇺🇦 UA
Storm-2460
apt_group 🇷🇺 RU
Dust Storm
apt_group Information theft and espionage 🇨🇳 CN
Dark Partners
apt_group
Chaya_004
apt_group 🇨🇳 CN

Triage Info

Decided atMar 03, 2026
Published DateApr 08, 2025