CVE-2025-32706
ENISA EUVD: EUVD-2025-14441 ↗
Exploited in the Wild
✓ Confirmed 0-Day
★ Google Project Zero
Triaged: March 5, 2026
2 articles
Published: 2025-05-13
EPSS Score
Source: FIRST.org · 2026-05-23
1.12%
probability
This CVE has a 1.12% probability
of being exploited in the next 30 days.
0%
Top 78.5th percentile of all CVEs
100%
CVSS v3.1
Source: VulnerabilityLookup (CIRCL)7.8
HIGH
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Temporal
Exploit Code Maturity
Functional
Remediation Level
Official Fix
Report Confidence
Confirmed
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
Description
NVDImproper input validation in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
Affected Products
Microsoft
Windows 10 Version 1507
10.0.10240.0
Microsoft
Windows 10 Version 1607
10.0.14393.0
Microsoft
Windows 10 Version 1809
10.0.17763.0
Microsoft
Windows 10 Version 21H2
10.0.19044.0
Microsoft
Windows 10 Version 22H2
10.0.19045.0
Google Project Zero
Patched
May 13, 2025
Reported by
Benoit Sevens of Google Threat Intelligence Group and CrowdStrike Advanced Research Team
Root Cause Analysis
???
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-32706
vendor-advisory
patch
Signal Intelligence
Confidence
95%
EPSS
1.12%
CVSS v3.1
7.8
Mentions
2
Last Seen
May 13, 2025
CNA Information
CNA Assigner
microsoft
CNA Title
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Analyst Note
Auto-imported from Google Project Zero — confirmed zero-day by definition.
Threat Actors 4
Circles
apt_group
Global
Mana Team
apt_group
🇨🇳 CN
APT 5
apt_group
Information theft and espionage
🇨🇳 CN
Storm-2460
apt_group
🇷🇺 RU
Triage Info
Decided atMar 05, 2026
Published DateMay 13, 2025