Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Brokering File System Vulnerability Let Attackers Escalate Privileges

Posted on December 22, 2025December 22, 2025 By CWS

Microsoft has patched a big use-after-free vulnerability in its Brokering File System (BFS) driver, tracked as CVE-2025-29970.

The flaw allows native attackers to escalate privileges on Home windows methods working remoted or sandboxed purposes, making it a notable concern for enterprise safety.

The vulnerability exists in bfs.sys, a minifilter driver developed alongside Home windows AppContainer and AppSilo, Microsoft’s sandbox mechanisms for isolating Win32 purposes.

CVE IDVulnerability TypeAffected ComponentSecurity ImpactCVSS ScoreAffected VersionsCVE-2025-29970Use-After-Free (UAF)Brokering File System (bfs.sys)Native Privilege Escalation8.8 (Excessive)Home windows 11, Server 2022+

BFS manages file, pipe, and registry operations from remoted purposes, making it a pretty goal for privilege escalation assaults.

Microsoft Brokering File System Vulnerability

The basis trigger lies in improper reminiscence administration within the deallocation logic of BFS’s DirectoryBlockList.

The susceptible code deallocates the linked-list head whereas nonetheless iterating by remaining entries in the identical loop, making a basic use-after-free situation.

When coverage entries are eliminated by way of the BfsProcessDeletePolicyEntryRequest IOCTL, the susceptible deallocation course of triggers. Permitting attackers to control freed reminiscence buildings.

Vulnerability Overview

HT3Labs, the safety analysis workforce that found this flaw, documented the vulnerability affecting bfs.sys model 26100.4061.

Microsoft separated the deallocation loop right into a devoted BfsCloseRootDirectory operate within the patch. Making certain the listing head is deallocated solely in spite of everything entries are processed.

Exploitation Necessities

Profitable exploitation calls for particular circumstances: the attacker should impersonate an acceptable course of with AppSilo token capabilities.

Create coverage entries inside the system, and repeatedly set off removing operations to drive freed reminiscence reclamation.

Testing revealed that solely Medium Integrity Degree processes can entry the BFS gadget, limiting the scope of exploitation however not eliminating the chance.

The assault sequence includes impersonating a low-box token, creating non permanent information in remoted software directories, and executing fast IOCTL-based add-remove cycles.

Whereas instant system crashes weren’t noticed because of reminiscence allocation patterns, sustained exploitation reliably triggers a deadly system error (0x00000050) in bfs.sys.

This vulnerability poses a big menace to methods that use Home windows sandbox options, significantly enterprises that deploy remoted purposes for enhanced safety.

Microsoft launched patches in January 2025; organizations ought to prioritize making use of them instantly. Safety groups ought to monitor for exploitation makes an attempt concentrating on medium-integrity processes. Think about proscribing untrusted software execution in sandboxed environments till a patch is deployed.

In keeping with PixiePointSecurity, the discovering reveals that even specialised safety drivers can nonetheless endure from refined reminiscence administration flaws.

Reinforcing the necessity for steady safety evaluation of Home windows kernel-mode parts.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attackers, Brokering, Escalate, File, Microsoft, Privileges, System, Vulnerability

Post navigation

Previous Post: Nissan Confirms Data Breach Following Unauthorized Access to Red Hat Servers
Next Post: PoC Exploit Released for Use-After-Free Vulnerability in Linux Kernel’s POSIX CPU Timers Implementation

Related Posts

New Cyber Attack Weaponizes DeskSoft to Deploy Malware Leveraging RDP Access to Execute Commands Cyber Security News
AI-Powered Penetration Testing Platform Includes GPT-4 and Other AI Engine’s Cyber Security News
Discord Data Breach – 1.5 TB of Data and 2 Million Government ID Photos Extorted Cyber Security News
Windows BitLocker Bypass Vulnerability Let Attackers Bypass Security Feature Cyber Security News
Threat Actors Embed Malicious RMM Tools to Gain Silent Initial Access to Organizations Cyber Security News
Securden Unified PAM Vulnerability Let Attackers Bypass Authentication Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login Tokens
  • BlindEagle Hackers Attacking Government Agencies with Powershell Scripts
  • PoC Exploit Released for Use-After-Free Vulnerability in Linux Kernel’s POSIX CPU Timers Implementation
  • Microsoft Brokering File System Vulnerability Let Attackers Escalate Privileges
  • Nissan Confirms Data Breach Following Unauthorized Access to Red Hat Servers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login Tokens
  • BlindEagle Hackers Attacking Government Agencies with Powershell Scripts
  • PoC Exploit Released for Use-After-Free Vulnerability in Linux Kernel’s POSIX CPU Timers Implementation
  • Microsoft Brokering File System Vulnerability Let Attackers Escalate Privileges
  • Nissan Confirms Data Breach Following Unauthorized Access to Red Hat Servers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark