Apr 2025: Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2025-29824 Published on April 8, 2025
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
Known Exploited Vulnerability
This Microsoft Windows Common Log File System (CLFS) Driver Use-After-Free Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Microsoft Windows Common Log File System (CLFS) Driver contains a use-after-free vulnerability that allows an authorized attacker to elevate privileges locally.
The following remediation steps are recommended / required by April 29, 2025: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Weakness Type
What is a Dangling pointer Vulnerability?
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
CVE-2025-29824 has been classified to as a Dangling pointer vulnerability or weakness.
Products Associated with CVE-2025-29824
Want to know whenever a new CVE is published for Microsoft products? stack.watch will email you.
Affected Versions
Microsoft Windows 10 Version 1507:- Version 10.0.10240.0 and below 10.0.10240.20978 is affected.
- Version 10.0.14393.0 and below 10.0.14393.7969 is affected.
- Version 10.0.17763.0 and below 10.0.17763.7136 is affected.
- Version 10.0.19044.0 and below 10.0.19044.5737 is affected.
- Version 10.0.19045.0 and below 10.0.19045.5737 is affected.
- Version 10.0.22621.0 and below 10.0.22621.5189 is affected.
- Version 10.0.22631.0 and below 10.0.22631.5189 is affected.
- Version 10.0.22631.0 and below 10.0.22631.5189 is affected.
- Version 10.0.26100.0 and below 10.0.26100.3775 is affected.
- Version 6.1.7601.0 and below 6.1.7601.27670 is affected.
- Version 6.1.7601.0 and below 6.1.7601.27670 is affected.
- Version 6.0.6003.0 and below 6.0.6003.23220 is affected.
- Version 6.0.6003.0 and below 6.0.6003.23220 is affected.
- Version 6.2.9200.0 and below 6.2.9200.25423 is affected.
- Version 6.2.9200.0 and below 6.2.9200.25423 is affected.
- Version 6.3.9600.0 and below 6.3.9600.22523 is affected.
- Version 6.3.9600.0 and below 6.3.9600.22523 is affected.
- Version 10.0.14393.0 and below 10.0.14393.7969 is affected.
- Version 10.0.14393.0 and below 10.0.14393.7969 is affected.
- Version 10.0.17763.0 and below 10.0.17763.7136 is affected.
- Version 10.0.17763.0 and below 10.0.17763.7136 is affected.
- Version 10.0.20348.0 and below 10.0.20348.3453 is affected.
- Version 10.0.25398.0 and below 10.0.25398.1551 is affected.
- Version 10.0.26100.0 and below 10.0.26100.3775 is affected.
- Version 10.0.26100.0 and below 10.0.26100.3775 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.