Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Windows Common Log File System 0-Day Vulnerability Actively Exploited in the Wild

Posted on May 13, 2025May 14, 2025 By CWS

Microsoft has confirmed that risk actors are actively exploiting two important vulnerabilities within the Home windows Frequent Log File System (CLFS) driver to achieve SYSTEM-level privileges on compromised techniques.

The vulnerabilities, tracked as CVE-2025-32706 and CVE-2025-32701, have been addressed within the Might 2025 Patch Tuesday safety replace launched on Might 13, 2025.

Important Vulnerabilities Underneath Lively Exploitation

Each vulnerabilities enable approved attackers to raise their privileges regionally to the SYSTEM degree, giving them full management over affected techniques.

CVE-2025-32706 stems from improper enter validation within the Home windows CLFS driver, whereas CVE-2025-32701 is classed as a use-after-free vulnerability in the identical part.

Safety researchers from Microsoft Risk Intelligence Heart (MSTIC) found and reported CVE-2025-32701, whereas CVE-2025-32706 was recognized by means of collaborative efforts between Benoit Sevens of Google Risk Intelligence Group and the CrowdStrike Superior Analysis Group.

“These vulnerabilities are significantly harmful as a result of they supply attackers with the best degree of system privileges,” mentioned a Microsoft safety engineer aware of the matter. “As soon as exploited, risk actors can successfully carry out any motion on the compromised system, together with deploying ransomware or exfiltrating delicate knowledge.”

This isn’t the primary time the Home windows CLFS driver has been focused. In April 2025, Microsoft fastened one other CLFS vulnerability (CVE-2025-29824) that was additionally being actively exploited in ransomware campaigns.

In line with safety specialists, CLFS vulnerabilities have turn into more and more widespread targets for attackers, with 32 such vulnerabilities patched since 2022, averaging 10 annually.

“The Frequent Log File System part continues to be a horny goal for risk actors resulting from its kernel-level entry and ubiquitous presence throughout Home windows techniques,” famous a safety researcher from Microsoft.

Connection to Ransomware Assaults

Earlier CLFS exploits have been linked to ransomware operations. In April, Microsoft reported that exploitation of a CLFS zero-day vulnerability led to ransomware deployment in opposition to organizations in a number of sectors, together with data know-how and actual property in the USA, monetary establishments in Venezuela, a Spanish software program firm, and retail companies in Saudi Arabia.

The exploitation chain usually begins with attackers gaining preliminary entry to a system, then utilizing these CLFS vulnerabilities to raise their privileges earlier than deploying ransomware or different malicious payloads.

Safety specialists strongly advise organizations to right away apply the Might 2025 Patch Tuesday updates to deal with these important vulnerabilities.

“Elevation of privilege vulnerabilities are essential parts in trendy assault chains,” mentioned a spokesperson from Microsoft’s Safety Response Heart. “Prioritizing these patches provides a significant layer of protection in opposition to ransomware assaults, even when risk actors handle to achieve preliminary entry to your techniques.”

Organizations also needs to implement further safety measures, together with enhanced monitoring for suspicious actions, limiting administrative privileges, and sustaining up-to-date backups to mitigate the potential impacts of profitable assaults.

Vulnerability Assault Simulation on How Hackers Quickly Probe Web sites for Entry Factors – Free Webinar

Cyber Security News Tags:0Day, Actively, Common, Exploited, File, Log, System, Vulnerability, Wild, Windows

Post navigation

Previous Post: Zero-Day Attacks Highlight Another Busy Microsoft Patch Tuesday
Next Post: Microsoft Scripting Engine 0-Day Vulnerability Enables Remote Code Execution Over Network

Related Posts

Hackers Exploit Software Flaws within Hours Forcing Urgent Push for Faster Patches Cyber Security News
Cloud Security Essentials – Protecting Multi-Cloud Environments Cyber Security News
Beware! Fake AI Video Generation Platforms Drop Stealer Malware on Your Computers Cyber Security News
Windows Ancillary for WinSock 0-Day Vulnerability Let Attackers Escalate Privileges Cyber Security News
Weaponized Google Calendar Invites Delivers Malicious Payload With Just One Character Cyber Security News
Hackers Attacking IT Admins by Poisoning SEO to Move Malware on Top of Search Results Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Printer Company Procolored Served Infected Software for Months
  • RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer
  • Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access
  • UK Legal Aid Agency Finds Data Breach Following Cyberattack
  • 480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2025

Recent Posts

  • Printer Company Procolored Served Infected Software for Months
  • RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer
  • Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access
  • UK Legal Aid Agency Finds Data Breach Following Cyberattack
  • 480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News