Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Baker Creek Pavilion: A blend of nature and architecture in Knoxville

Review Week: X CEO Linda Yaccarino stepping on

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Microsoft Patch 126 Flaws including vulnerabilities in Windows CLFS that were actively utilized
Identity

Microsoft Patch 126 Flaws including vulnerabilities in Windows CLFS that were actively utilized

userBy userApril 9, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 9, 2025Ravi LakshmananEndpoint security/vulnerability

Windows CLFS Vulnerability

Microsoft has released security fixes to address a large set of 126 flaws that affect software products.

Of the 126 vulnerabilities, 11 are rated as important, 112 are rated as important, and two are rated as low severity. 49 of these vulnerabilities are classified as privilege escalations, 34 as remote code execution, 16 as information disclosure, and 14 as denial of service (DOS) bugs.

The update apart from the 22 flaws the company has patched on chrome-based edge browser since the release of the patch Tuesday last month.

The vulnerability flagged based on active attacks is the height of the privilege (EOP) flaw that affects the Windows Common Log File System (CLFS) driver (CVE-2025-29824, CVSS score: 7.8).

CVE-2025-29824 is the sixth EOP vulnerability discovered in the same component that has been exploited in the wild since 2022, with others CVE-2022-24521, CVE-2022-37969, CVE-2023-23376, CVE-2023-28252, and CVE-2024-138 (CVE-2024-138) 7.8).

“From an attacker’s perspective, post-competitive activities require the privileges needed to carry out subsequent activities in compromised systems such as lateral movement,” said Satnam Naran, Senior Staff Research Engineer at Tenable.

“Therefore, rising privilege bugs are generally popular in targeted attacks. However, rising privilege flaws in CLF have been particularly popular among ransomware operators over the years.”

Mike Walters, president and co-founder of Action1, offers the ability to allow vulnerabilities to escalate privileges to the system level, install malicious software for attackers, modify system settings, tamper with security features, access sensitive data, and maintain persistent access.

“What is particularly concerning about this vulnerability is that Microsoft has confirmed aggressive exploitation in the wild, but at this time there have been no patches released for Windows 10 32-bit or 64-bit systems,” said a leading cybersecurity engineer at Immersive. “The lack of patches leaves a significant gap in defense against a wider part of the Windows ecosystem.”

“Under certain memory operating conditions, it can be disabled so that an attacker can use it to execute code at the highest privilege level in the window. Importantly, an attacker does not need control to exploit the vulnerability.

The aggressive exploitation of flaws per Microsoft is linked to ransomware attacks on a small number of targets. This development prompted the US Cybersecurity and Infrastructure Security Agency (CISA) to add it to a known Exploited Vulnerability (KEV) catalogue that requires federal agencies to apply the fix by April 29, 2025.

Other notable vulnerabilities that Redmond patched this month include the security feature bypass (SFB) flaws affecting Windows Kerberos (CVE-2025-29809), and the remote code execution flaws in Windows Remote Desktop Services (CVE-2025-27480, CVE-2025-27482), and the Windows Lightweight Directory Access Tocot. (CVE-2025-26663, CVE-2025-26670)

It is also worth noting that multiple critical remote code execution flaws for Microsoft Office and Excel (CVE-2025-29791, CVE-2025-27748, CVE-2025-27748, CVE-2025-27748, CVE-2025-27748, CVE-2025-27752, and CVE-2025-27752.

Capping a list of critical flaws is two remote code execution vulnerabilities affecting Windows TCP/IP (CVE-2025-26686) and Windows Hyper-V (CVE-2025-27491), which can allow attackers to execute code on the network under certain conditions.

It is worth noting that some of the vulnerabilities have not yet received a patch for Windows 10. Microsoft said the update will be “released as soon as possible and if available, customers will be notified by a revision of this CVE information.”

Software patches from other vendors

In addition to Microsoft, security updates have also been released by other vendors over the past few weeks, rectifying some vulnerabilities.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleLuka Doncic has been kicked out. The Lakers lose to lightning because Shai has a score of 42 | Basketball news
Next Article Judge orders the White House to restore media access to US communications agencies | Press Freedom
user
  • Website

Related Posts

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

July 12, 2025

Over 600 laravel apps exposed to remote code execution due to app_keys leaked on github

July 12, 2025

Fortinet releases patches for important SQL injection defects in Fortiweb (CVE-2025-25257)

July 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Baker Creek Pavilion: A blend of nature and architecture in Knoxville

Review Week: X CEO Linda Yaccarino stepping on

New Rowhammer Attack Variant Degrades AI Models on Nvidia GPUs

Xai and Grok apologise for “terrifying behaviour”

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.