Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Windows Common Log File System 0-Day Vulnerability Actively Exploited in the Wild

Posted on May 13, 2025May 14, 2025 By CWS

Microsoft has confirmed that risk actors are actively exploiting two important vulnerabilities within the Home windows Frequent Log File System (CLFS) driver to achieve SYSTEM-level privileges on compromised techniques.

The vulnerabilities, tracked as CVE-2025-32706 and CVE-2025-32701, have been addressed within the Might 2025 Patch Tuesday safety replace launched on Might 13, 2025.

Important Vulnerabilities Underneath Lively Exploitation

Each vulnerabilities enable approved attackers to raise their privileges regionally to the SYSTEM degree, giving them full management over affected techniques.

CVE-2025-32706 stems from improper enter validation within the Home windows CLFS driver, whereas CVE-2025-32701 is classed as a use-after-free vulnerability in the identical part.

Safety researchers from Microsoft Risk Intelligence Heart (MSTIC) found and reported CVE-2025-32701, whereas CVE-2025-32706 was recognized by means of collaborative efforts between Benoit Sevens of Google Risk Intelligence Group and the CrowdStrike Superior Analysis Group.

“These vulnerabilities are significantly harmful as a result of they supply attackers with the best degree of system privileges,” mentioned a Microsoft safety engineer aware of the matter. “As soon as exploited, risk actors can successfully carry out any motion on the compromised system, together with deploying ransomware or exfiltrating delicate knowledge.”

This isn’t the primary time the Home windows CLFS driver has been focused. In April 2025, Microsoft fastened one other CLFS vulnerability (CVE-2025-29824) that was additionally being actively exploited in ransomware campaigns.

In line with safety specialists, CLFS vulnerabilities have turn into more and more widespread targets for attackers, with 32 such vulnerabilities patched since 2022, averaging 10 annually.

“The Frequent Log File System part continues to be a horny goal for risk actors resulting from its kernel-level entry and ubiquitous presence throughout Home windows techniques,” famous a safety researcher from Microsoft.

Connection to Ransomware Assaults

Earlier CLFS exploits have been linked to ransomware operations. In April, Microsoft reported that exploitation of a CLFS zero-day vulnerability led to ransomware deployment in opposition to organizations in a number of sectors, together with data know-how and actual property in the USA, monetary establishments in Venezuela, a Spanish software program firm, and retail companies in Saudi Arabia.

The exploitation chain usually begins with attackers gaining preliminary entry to a system, then utilizing these CLFS vulnerabilities to raise their privileges earlier than deploying ransomware or different malicious payloads.

Safety specialists strongly advise organizations to right away apply the Might 2025 Patch Tuesday updates to deal with these important vulnerabilities.

“Elevation of privilege vulnerabilities are essential parts in trendy assault chains,” mentioned a spokesperson from Microsoft’s Safety Response Heart. “Prioritizing these patches provides a significant layer of protection in opposition to ransomware assaults, even when risk actors handle to achieve preliminary entry to your techniques.”

Organizations also needs to implement further safety measures, together with enhanced monitoring for suspicious actions, limiting administrative privileges, and sustaining up-to-date backups to mitigate the potential impacts of profitable assaults.

Vulnerability Assault Simulation on How Hackers Quickly Probe Web sites for Entry Factors – Free Webinar

Cyber Security News Tags:0Day, Actively, Common, Exploited, File, Log, System, Vulnerability, Wild, Windows

Post navigation

Previous Post: Zero-Day Attacks Highlight Another Busy Microsoft Patch Tuesday
Next Post: Microsoft Scripting Engine 0-Day Vulnerability Enables Remote Code Execution Over Network

Related Posts

Hackers Compromise Intelligence Website Used by CIA and Other Agencies Cyber Security News
New CrushFTP 0-Day Vulnerability Exploited in the Wild to Gain Access to Servers Cyber Security News
Hackers Actively Exploiting Cisco and Citrix 0-Days in the Wild to Deploy Webshell Cyber Security News
Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention Cyber Security News
Buterat Backdoor Attacking Enterprises to Establish Persistence and Control Endpoints Cyber Security News
Metasploit Module Released For Actively Exploited SharePoint 0-Day Vulnerabilities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark