CVE-2025-29824
ENISA EUVD: EUVD-2025-10122 ↗
Exploited in the Wild
✓ Confirmed 0-Day
★ Google Project Zero
Triaged: March 3, 2026
10 articles
Published: 2025-04-08
EPSS Score
Source: FIRST.org · 2026-05-23
0.95%
probability
This CVE has a 0.95% probability
of being exploited in the next 30 days.
0%
Top 76.6th percentile of all CVEs
100%
CVSS v3.1
Source: VulnerabilityLookup (CIRCL)7.8
HIGH
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Temporal
Exploit Code Maturity
Functional
Remediation Level
Official Fix
Report Confidence
Confirmed
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
Description
NVDUse after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
Affected Products
Microsoft
Windows 10 Version 1507
10.0.10240.0
Microsoft
Windows 10 Version 1607
10.0.14393.0
Microsoft
Windows 10 Version 1809
10.0.17763.0
Microsoft
Windows 10 Version 21H2
10.0.19044.0
Microsoft
Windows 10 Version 22H2
10.0.19045.0
Attack Intelligence
CWE-118
· Incorrect Access of Indexable Resource ('Range Error')
CWE-119
· Buffer Overflow
CWE-416
· Use After Free
CWE-664
· Improper Control of a Resource Through its Lifetime
CWE-666
· Operation on Resource in Wrong Phase of Lifetime
CWE-672
· Operation on a Resource after Expiration or Release
CWE-825
· Expired Pointer Dereference
Google Project Zero
Patched
April 8, 2025
Reported by
Microsoft Threat Intelligence Center
Root Cause Analysis
???
Exploits & PoC
29
2025-05-14
AfanPan/CVE-2025-29824-Exploit
Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
21
2025-07-30
1
2026-03-17
3 repos — triés par ⭐
Rechercher sur GitHub ↗
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29824
vendor-advisory
patch
Signal Intelligence
Confidence
92%
EPSS
0.95%
CVSS v3.1
7.8
Mentions
10
Last Seen
May 07, 2025
CNA Information
CNA Assigner
microsoft
CNA Title
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Analyst Note
This CVE is confirmed as exploited in active ransomware campaigns by Play and other threat actors, with coverage from reputable sources including BleepingComputer and CERT-EU advisory confirmation. The presence in Google Project Zero and documented real-world exploitation of the Windows CLFS use-after-free vulnerability substantiate the confirmed status despite not yet appearing in CISA's KEV catalog.
Threat Actors 30
Cobalt
apt_group
Financial crime
🇷🇺 RU
APT 28
apt_group
Information theft and espionage
🇷🇺 RU
Hacking Team
apt_group
🇮🇹 IT
SCATTERED SPIDER
apt_group
Financial crime
🇺🇸 US
The Shadow Brokers
apt_group
🇷🇺 RU
Infy
apt_group
Information theft and espionage
🇮🇷 IR
Group 27
apt_group
Information theft and espionage
🇨🇳 CN
[Unnamed group]
apt_group
🇨🇳 CN
RomCom
apt_group
Financial gain
🇷🇺 RU
UNC5174
apt_group
🇨🇳 CN
Returned Libra
apt_group
🇨🇳 CN
APT 22
apt_group
Information theft and espionage
🇨🇳 CN
Rocke
apt_group
🇨🇳 CN
APT 6
apt_group
Information theft and espionage
🇨🇳 CN
SOLAR SPIDER
apt_group
🇨🇳 CN
RevengeHotels
apt_group
Information theft and espionage
🇧🇷 BR
Red October
apt_group
🇷🇺 RU
The White Company
apt_group
Information theft and espionage
🇨🇳 CN
Circles
apt_group
Global
Pat Bear
apt_group
🇸🇾 SY
Unnamed Actor
apt_group
🇨🇳 CN
Shadow Network
apt_group
Information theft and espionage
🇨🇳 CN
Mana Team
apt_group
🇨🇳 CN
UNION SPIDER
apt_group
🇷🇺 RU
APT 5
apt_group
Information theft and espionage
🇨🇳 CN
Cyber Alliance
apt_group
🇺🇦 UA
Storm-2460
apt_group
🇷🇺 RU
Dust Storm
apt_group
Information theft and espionage
🇨🇳 CN
Dark Partners
apt_group
Chaya_004
apt_group
🇨🇳 CN
Triage Info
Decided atMar 03, 2026
Published DateApr 08, 2025