May 2025: Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2025-32706 Published on May 13, 2025
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Improper input validation in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
Known Exploited Vulnerability
This Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer Overflow Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Microsoft Windows Common Log File System (CLFS) Driver contains a heap-based buffer overflow vulnerability that allows an authorized attacker to elevate privileges locally.
The following remediation steps are recommended / required by June 3, 2025: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Weakness Type
Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Products Associated with CVE-2025-32706
Want to know whenever a new CVE is published for Microsoft products? stack.watch will email you.
Affected Versions
Microsoft Windows 10 Version 1507:- Version 10.0.10240.0 and below 10.0.10240.21014 is affected.
- Version 10.0.14393.0 and below 10.0.14393.8066 is affected.
- Version 10.0.17763.0 and below 10.0.17763.7314 is affected.
- Version 10.0.19044.0 and below 10.0.19044.5854 is affected.
- Version 10.0.19045.0 and below 10.0.19045.5854 is affected.
- Version 10.0.22621.0 and below 10.0.22621.5335 is affected.
- Version 10.0.22631.0 and below 10.0.22631.5335 is affected.
- Version 10.0.22631.0 and below 10.0.22631.5335 is affected.
- Version 10.0.26100.0 and below 10.0.26100.4061 is affected.
- Version 6.1.7601.0 and below 6.1.7601.27729 is affected.
- Version 6.1.7601.0 and below 6.1.7601.27729 is affected.
- Version 6.0.6003.0 and below 6.0.6003.23279 is affected.
- Version 6.0.6003.0 and below 6.0.6003.23279 is affected.
- Version 6.2.9200.0 and below 6.2.9200.25475 is affected.
- Version 6.2.9200.0 and below 6.2.9200.25475 is affected.
- Version 6.3.9600.0 and below 6.3.9600.22577 is affected.
- Version 6.3.9600.0 and below 6.3.9600.22577 is affected.
- Version 10.0.14393.0 and below 10.0.14393.8066 is affected.
- Version 10.0.14393.0 and below 10.0.14393.8066 is affected.
- Version 10.0.17763.0 and below 10.0.17763.7314 is affected.
- Version 10.0.17763.0 and below 10.0.17763.7314 is affected.
- Version 10.0.20348.0 and below 10.0.20348.3692 is affected.
- Version 10.0.25398.0 and below 10.0.25398.1611 is affected.
- Version 10.0.26100.0 and below 10.0.26100.4061 is affected.
- Version 10.0.26100.0 and below 10.0.26100.4061 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.