Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Brokering File System Vulnerability Let Attackers Escalate Privileges

Microsoft Brokering File System Vulnerability Let Attackers Escalate Privileges

Posted on December 22, 2025December 22, 2025 By CWS

Microsoft has patched a big use-after-free vulnerability in its Brokering File System (BFS) driver, tracked as CVE-2025-29970.

The flaw allows native attackers to escalate privileges on Home windows methods working remoted or sandboxed purposes, making it a notable concern for enterprise safety.

The vulnerability exists in bfs.sys, a minifilter driver developed alongside Home windows AppContainer and AppSilo, Microsoft’s sandbox mechanisms for isolating Win32 purposes.

CVE IDVulnerability TypeAffected ComponentSecurity ImpactCVSS ScoreAffected VersionsCVE-2025-29970Use-After-Free (UAF)Brokering File System (bfs.sys)Native Privilege Escalation8.8 (Excessive)Home windows 11, Server 2022+

BFS manages file, pipe, and registry operations from remoted purposes, making it a pretty goal for privilege escalation assaults.

Microsoft Brokering File System Vulnerability

The basis trigger lies in improper reminiscence administration within the deallocation logic of BFS’s DirectoryBlockList.

The susceptible code deallocates the linked-list head whereas nonetheless iterating by remaining entries in the identical loop, making a basic use-after-free situation.

When coverage entries are eliminated by way of the BfsProcessDeletePolicyEntryRequest IOCTL, the susceptible deallocation course of triggers. Permitting attackers to control freed reminiscence buildings.

Vulnerability Overview

HT3Labs, the safety analysis workforce that found this flaw, documented the vulnerability affecting bfs.sys model 26100.4061.

Microsoft separated the deallocation loop right into a devoted BfsCloseRootDirectory operate within the patch. Making certain the listing head is deallocated solely in spite of everything entries are processed.

Exploitation Necessities

Profitable exploitation calls for particular circumstances: the attacker should impersonate an acceptable course of with AppSilo token capabilities.

Create coverage entries inside the system, and repeatedly set off removing operations to drive freed reminiscence reclamation.

Testing revealed that solely Medium Integrity Degree processes can entry the BFS gadget, limiting the scope of exploitation however not eliminating the chance.

The assault sequence includes impersonating a low-box token, creating non permanent information in remoted software directories, and executing fast IOCTL-based add-remove cycles.

Whereas instant system crashes weren’t noticed because of reminiscence allocation patterns, sustained exploitation reliably triggers a deadly system error (0x00000050) in bfs.sys.

This vulnerability poses a big menace to methods that use Home windows sandbox options, significantly enterprises that deploy remoted purposes for enhanced safety.

Microsoft launched patches in January 2025; organizations ought to prioritize making use of them instantly. Safety groups ought to monitor for exploitation makes an attempt concentrating on medium-integrity processes. Think about proscribing untrusted software execution in sandboxed environments till a patch is deployed.

In keeping with PixiePointSecurity, the discovering reveals that even specialised safety drivers can nonetheless endure from refined reminiscence administration flaws.

Reinforcing the necessity for steady safety evaluation of Home windows kernel-mode parts.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attackers, Brokering, Escalate, File, Microsoft, Privileges, System, Vulnerability

Post navigation

Previous Post: Nissan Confirms Data Breach Following Unauthorized Access to Red Hat Servers
Next Post: PoC Exploit Released for Use-After-Free Vulnerability in Linux Kernel’s POSIX CPU Timers Implementation

Related Posts

CISA Warns of Federal Agencies Not Fully Patching Actively Exploited Cisco ASA or Firepower Devices CISA Warns of Federal Agencies Not Fully Patching Actively Exploited Cisco ASA or Firepower Devices Cyber Security News
Shuyal Stealer Attacking 19 Browsers to Steal Login Credentials Shuyal Stealer Attacking 19 Browsers to Steal Login Credentials Cyber Security News
Threat Actors Compromise 270+ Legitimate Websites With Malicious JavaScript Using JSFireTruck Obfuscation Threat Actors Compromise 270+ Legitimate Websites With Malicious JavaScript Using JSFireTruck Obfuscation Cyber Security News
Google Project Zero Details ASLR Bypass on Apple Devices Using NSDictionary Serialization Google Project Zero Details ASLR Bypass on Apple Devices Using NSDictionary Serialization Cyber Security News
Five Hackers Behind Notorious Data Selling Platform BreachForums Arrested Five Hackers Behind Notorious Data Selling Platform BreachForums Arrested Cyber Security News
Kimsuky APT Hackers Weaponizing LNK Files to Deploy Reflective Malware Bypassing Windows Defender Kimsuky APT Hackers Weaponizing LNK Files to Deploy Reflective Malware Bypassing Windows Defender Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News