Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
References
Link | Resource |
---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29824 | Vendor Advisory |
https://www.vicarius.io/vsociety/posts/cve-2025-29824-windows-common-log-file-system-driver-elevation-of-privilege-vulnerability-detection-script | Exploit Third Party Advisory |
https://www.vicarius.io/vsociety/posts/cve-2025-29824-windows-common-log-file-system-driver-elevation-of-privilege-vulnerability-mitigation-script | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
17 Apr 2025, 18:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.vicarius.io/vsociety/posts/cve-2025-29824-windows-common-log-file-system-driver-elevation-of-privilege-vulnerability-detection-script - Exploit, Third Party Advisory | |
References | () https://www.vicarius.io/vsociety/posts/cve-2025-29824-windows-common-log-file-system-driver-elevation-of-privilege-vulnerability-mitigation-script - Exploit, Third Party Advisory |
16 Apr 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
11 Apr 2025, 13:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29824 - Vendor Advisory | |
First Time |
Microsoft windows 10 1809
Microsoft windows Server 2008 Microsoft windows 10 22h2 Microsoft windows Server 2016 Microsoft windows Server 2022 23h2 Microsoft windows Server 2025 Microsoft windows Server 2012 Microsoft windows Server 2022 Microsoft windows 10 1607 Microsoft windows 11 24h2 Microsoft windows Server 2019 Microsoft Microsoft windows 11 22h2 Microsoft windows 10 21h2 |
|
CPE | cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:*:sp1:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x32:* cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x32:* cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x32:* cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x32:* cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x32:* cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:* |
09 Apr 2025, 20:03
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
08 Apr 2025, 18:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-08 18:16
Updated : 2025-04-17 18:29
NVD link : CVE-2025-29824
Mitre link : CVE-2025-29824
CVE.ORG link : CVE-2025-29824
JSON object : View
Products Affected
microsoft
- windows_server_2019
- windows_server_2025
- windows_server_2022
- windows_10_21h2
- windows_server_2008
- windows_11_22h2
- windows_server_2012
- windows_10_1809
- windows_11_24h2
- windows_server_2022_23h2
- windows_server_2016
- windows_10_22h2
- windows_10_1607
CWE
CWE-416
Use After Free