Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Windows Common Log File System Driver Vulnerability Let Attackers Escalate Privileges

Posted on June 11, 2025June 11, 2025 By CWS

A essential safety vulnerability within the Home windows Frequent Log File System Driver (CLFS) permits attackers to escalate their privileges to SYSTEM stage entry. 

The vulnerability, tracked as CVE-2025-32713, was launched on June 10, 2025, and impacts a number of Home windows working programs from legacy variations to the newest Home windows 11 and Home windows Server 2025.

The vulnerability stems from a heap-based buffer overflow within the Home windows Frequent Log File System Driver, categorized below CWE-122: Heap-based Buffer Overflow. 

Heap-Primarily based Buffer Overflow in Home windows CLFS Driver

Microsoft has assigned this vulnerability an “Vital” severity score with a CVSS 3.1 rating of seven.8/6.8. 

The CVSS vector string CVSS:3.1 signifies that whereas the assault vector is native, it requires low assault complexity and low privileges, with no person interplay wanted.

The vulnerability’s assault traits make it notably regarding for enterprise environments. An attacker who efficiently exploits this flaw may achieve SYSTEM privileges, representing the very best stage of entry in Home windows programs. 

The exploit evaluation signifies that “Exploitation Extra Probably,” although Microsoft confirms that the vulnerability has not been publicly disclosed or exploited within the wild as of the disclosure date.

Safety researcher Seunghoe Kim with S2W Inc. found and reported this vulnerability via Microsoft’s coordinated vulnerability disclosure program. 

The heap-based buffer overflow permits authenticated attackers to govern reminiscence allocation processes throughout the Frequent Log File System Driver, probably resulting in arbitrary code execution with elevated privileges.

Threat FactorsDetailsAffected ProductsWindows Consumer OS: 10 (1607, 1809, 21H2, 22H2), 11 (22H2, 23H2, 24H2)Home windows Server OS: 2008, 2012/R2, 2016, 2019, 2022, 2025ImpactSYSTEM-level privilege escalationExploit PrerequisitesLocal system entry, low-privilege person accountCVSS 3.1 Score7.8 (Vital)

Affected Programs and Safety Updates

The vulnerability impacts an in depth vary of Home windows working programs, demonstrating the widespread nature of the Frequent Log File System Driver part. 

Affected programs embrace Home windows 10 variations 1607, 1809, 21H2, and 22H2, Home windows 11 variations 22H2, 23H2, and 24H2, and a number of Home windows Server editions, together with Home windows Server 2008, 2012, 2016, 2019, 2022, and the most recent Home windows Server 2025.

Microsoft has launched complete safety updates throughout all affected platforms. For Home windows 11 model 23H2, the safety replace KB5060999 brings programs to construct 10.0.22631.5472. 

Home windows 10 model 22H2 customers ought to replace KB5060533 to achieve construct 10.0.19045.5965. Home windows Server 2025 receives twin updates KB5060842 and KB5060841, updating to builds 10.0.26100.4349 and 10.0.26100.427,0, respectively.

Legacy programs aren’t forgotten on this patch cycle. Home windows Server 2012 R2 receives Month-to-month Rollup KB5061018, updating to model 6.3.9600.22620, whereas Home windows Server 2008 programs get updates KB5061026 and KB5061072, reaching model 6.0.6003.23351.

Organizations ought to prioritize the rapid deployment of those safety updates given the vulnerability’s potential for privilege escalation assaults. 

Microsoft recommends following normal safety practices, together with implementing defense-in-depth methods, sustaining up to date endpoint safety, and monitoring for uncommon privilege escalation actions in safety logs.

Automate risk response with ANY.RUN’s TI Feeds—Enrich alerts and block malicious IPs throughout all endpoints -> Request full entry

Cyber Security News Tags:Attackers, Common, Driver, Escalate, File, Log, Privileges, System, Vulnerability, Windows

Post navigation

Previous Post: Securonix Acquires Threat Intelligence Firm ThreatQuotient
Next Post: Linux Malware Authors Attacking Cloud Environments Using ELF Binaries

Related Posts

Behavioral Monitoring for Real-Time Endpoint Threat Detection Cyber Security News
Hackers Exploit ComfyUI 700+ AI Image Generation Servers to Deploy Malware Cyber Security News
Windows Remote Desktop Vulnerability Let Attackers Execute Malicious Code Over Network Cyber Security News
APT36 Hackers Attacking Indian Defense Personnel in Sophisticated Phishing Attack Cyber Security News
New ZuRu Malware Variant Attacking macOS Users Via Weaponized Termius App Cyber Security News
FortiWeb SQL Injection Vulnerability Allows Attacker to Execute Malicious SQL Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Bill Aims to Create National Strategy for Quantum Cybersecurity Migration
  • $1 Million Offered for WhatsApp Exploit at Pwn2Own Ireland 2025
  • Hackers Weaponizing Free Trials of EDR to Disable Existing EDR Protections
  • Unit 42 Unveils Attribution Framework to Classify Threat Actors Based on Activity
  • Threat Actors Embed Malicious RMM Tools to Gain Silent Initial Access to Organizations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Bill Aims to Create National Strategy for Quantum Cybersecurity Migration
  • $1 Million Offered for WhatsApp Exploit at Pwn2Own Ireland 2025
  • Hackers Weaponizing Free Trials of EDR to Disable Existing EDR Protections
  • Unit 42 Unveils Attribution Framework to Classify Threat Actors Based on Activity
  • Threat Actors Embed Malicious RMM Tools to Gain Silent Initial Access to Organizations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News