Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Windows Common Log File System 0-Day Vulnerability Actively Exploited in the Wild

Posted on May 13, 2025May 14, 2025 By CWS

Microsoft has confirmed that risk actors are actively exploiting two important vulnerabilities within the Home windows Frequent Log File System (CLFS) driver to achieve SYSTEM-level privileges on compromised techniques.

The vulnerabilities, tracked as CVE-2025-32706 and CVE-2025-32701, have been addressed within the Might 2025 Patch Tuesday safety replace launched on Might 13, 2025.

Important Vulnerabilities Underneath Lively Exploitation

Each vulnerabilities enable approved attackers to raise their privileges regionally to the SYSTEM degree, giving them full management over affected techniques.

CVE-2025-32706 stems from improper enter validation within the Home windows CLFS driver, whereas CVE-2025-32701 is classed as a use-after-free vulnerability in the identical part.

Safety researchers from Microsoft Risk Intelligence Heart (MSTIC) found and reported CVE-2025-32701, whereas CVE-2025-32706 was recognized by means of collaborative efforts between Benoit Sevens of Google Risk Intelligence Group and the CrowdStrike Superior Analysis Group.

“These vulnerabilities are significantly harmful as a result of they supply attackers with the best degree of system privileges,” mentioned a Microsoft safety engineer aware of the matter. “As soon as exploited, risk actors can successfully carry out any motion on the compromised system, together with deploying ransomware or exfiltrating delicate knowledge.”

This isn’t the primary time the Home windows CLFS driver has been focused. In April 2025, Microsoft fastened one other CLFS vulnerability (CVE-2025-29824) that was additionally being actively exploited in ransomware campaigns.

In line with safety specialists, CLFS vulnerabilities have turn into more and more widespread targets for attackers, with 32 such vulnerabilities patched since 2022, averaging 10 annually.

“The Frequent Log File System part continues to be a horny goal for risk actors resulting from its kernel-level entry and ubiquitous presence throughout Home windows techniques,” famous a safety researcher from Microsoft.

Connection to Ransomware Assaults

Earlier CLFS exploits have been linked to ransomware operations. In April, Microsoft reported that exploitation of a CLFS zero-day vulnerability led to ransomware deployment in opposition to organizations in a number of sectors, together with data know-how and actual property in the USA, monetary establishments in Venezuela, a Spanish software program firm, and retail companies in Saudi Arabia.

The exploitation chain usually begins with attackers gaining preliminary entry to a system, then utilizing these CLFS vulnerabilities to raise their privileges earlier than deploying ransomware or different malicious payloads.

Safety specialists strongly advise organizations to right away apply the Might 2025 Patch Tuesday updates to deal with these important vulnerabilities.

“Elevation of privilege vulnerabilities are essential parts in trendy assault chains,” mentioned a spokesperson from Microsoft’s Safety Response Heart. “Prioritizing these patches provides a significant layer of protection in opposition to ransomware assaults, even when risk actors handle to achieve preliminary entry to your techniques.”

Organizations also needs to implement further safety measures, together with enhanced monitoring for suspicious actions, limiting administrative privileges, and sustaining up-to-date backups to mitigate the potential impacts of profitable assaults.

Vulnerability Assault Simulation on How Hackers Quickly Probe Web sites for Entry Factors – Free Webinar

Cyber Security News Tags:0Day, Actively, Common, Exploited, File, Log, System, Vulnerability, Wild, Windows

Post navigation

Previous Post: Zero-Day Attacks Highlight Another Busy Microsoft Patch Tuesday
Next Post: Microsoft Scripting Engine 0-Day Vulnerability Enables Remote Code Execution Over Network

Related Posts

Predator Mobile Spyware Remains Consistent with New Design Changes to Evade Detection Cyber Security News
Aembit Expands Workload IAM to Microsoft Ecosystem, Enhancing Hybrid Security for Non-Human Identities Cyber Security News
Scaly Wolf Attacking Organizations to Uncover Organizations’ Secrets Cyber Security News
Muddled Libra Actors Attacking Organizations Call Centers for Initial Infiltration Cyber Security News
Countering Spear Phishing with Advanced Email Security Solutions Cyber Security News
What is ClickFix Attack – How Hackers are Using it to Attack User Device With Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • How Businesses Stop Complex Social Engineering Attacks Early
  • GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
  • Slow and Steady Security: Lessons from the Tortoise and the Hare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • How Businesses Stop Complex Social Engineering Attacks Early
  • GPT-5 Has a Vulnerability: Its Router Can Send You to Older, Less Safe Models
  • Slow and Steady Security: Lessons from the Tortoise and the Hare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News