Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
References
Link | Resource |
---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29824 | Vendor Advisory |
https://www.vicarius.io/vsociety/posts/cve-2025-29824-windows-common-log-file-system-driver-elevation-of-privilege-vulnerability-detection-script | Exploit Third Party Advisory |
https://www.vicarius.io/vsociety/posts/cve-2025-29824-windows-common-log-file-system-driver-elevation-of-privilege-vulnerability-mitigation-script | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
05 May 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:microsoft:windows_server_2008:*:sp1:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x32:* cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x32:* cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x32:* cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x32:* |
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:* |
First Time |
Microsoft windows 10 1507
Microsoft windows 11 23h2 |
17 Apr 2025, 18:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.vicarius.io/vsociety/posts/cve-2025-29824-windows-common-log-file-system-driver-elevation-of-privilege-vulnerability-detection-script - Exploit, Third Party Advisory | |
References | () https://www.vicarius.io/vsociety/posts/cve-2025-29824-windows-common-log-file-system-driver-elevation-of-privilege-vulnerability-mitigation-script - Exploit, Third Party Advisory |
16 Apr 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
11 Apr 2025, 13:52
Type | Values Removed | Values Added |
---|---|---|
First Time |
Microsoft windows 10 21h2
Microsoft windows Server 2022 23h2 Microsoft windows Server 2008 Microsoft windows 10 1809 Microsoft windows Server 2019 Microsoft windows Server 2012 Microsoft windows 11 22h2 Microsoft Microsoft windows Server 2016 Microsoft windows Server 2025 Microsoft windows 10 22h2 Microsoft windows 10 1607 Microsoft windows Server 2022 Microsoft windows 11 24h2 |
|
References | () https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29824 - Vendor Advisory | |
CPE | cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x32:* cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x32:* cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_server_2008:*:sp1:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x32:* cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x32:* cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:x32:* cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* |
09 Apr 2025, 20:03
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
08 Apr 2025, 18:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-08 18:16
Updated : 2025-05-05 19:15
NVD link : CVE-2025-29824
Mitre link : CVE-2025-29824
CVE.ORG link : CVE-2025-29824
JSON object : View
Products Affected
microsoft
- windows_10_21h2
- windows_server_2016
- windows_server_2022_23h2
- windows_11_23h2
- windows_server_2022
- windows_server_2025
- windows_10_22h2
- windows_11_24h2
- windows_server_2008
- windows_10_1809
- windows_server_2019
- windows_10_1507
- windows_server_2012
- windows_10_1607
- windows_11_22h2
CWE
CWE-416
Use After Free