Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Anthropic CEO Dario Amodei calls OpenAI’s message about military agreement a ‘blatant lie,’ report says

Google settles with Epic Games, lowers Play Store fees to 20%

MacBook Neo, iPhone 17e, and everything else Apple announced this week

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Microsoft Patch 126 Flaws including vulnerabilities in Windows CLFS that were actively utilized
Identity

Microsoft Patch 126 Flaws including vulnerabilities in Windows CLFS that were actively utilized

userBy userApril 9, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 9, 2025Ravi LakshmananEndpoint security/vulnerability

Windows CLFS Vulnerability

Microsoft has released security fixes to address a large set of 126 flaws that affect software products.

Of the 126 vulnerabilities, 11 are rated as important, 112 are rated as important, and two are rated as low severity. 49 of these vulnerabilities are classified as privilege escalations, 34 as remote code execution, 16 as information disclosure, and 14 as denial of service (DOS) bugs.

The update apart from the 22 flaws the company has patched on chrome-based edge browser since the release of the patch Tuesday last month.

The vulnerability flagged based on active attacks is the height of the privilege (EOP) flaw that affects the Windows Common Log File System (CLFS) driver (CVE-2025-29824, CVSS score: 7.8).

CVE-2025-29824 is the sixth EOP vulnerability discovered in the same component that has been exploited in the wild since 2022, with others CVE-2022-24521, CVE-2022-37969, CVE-2023-23376, CVE-2023-28252, and CVE-2024-138 (CVE-2024-138) 7.8).

“From an attacker’s perspective, post-competitive activities require the privileges needed to carry out subsequent activities in compromised systems such as lateral movement,” said Satnam Naran, Senior Staff Research Engineer at Tenable.

“Therefore, rising privilege bugs are generally popular in targeted attacks. However, rising privilege flaws in CLF have been particularly popular among ransomware operators over the years.”

Mike Walters, president and co-founder of Action1, offers the ability to allow vulnerabilities to escalate privileges to the system level, install malicious software for attackers, modify system settings, tamper with security features, access sensitive data, and maintain persistent access.

“What is particularly concerning about this vulnerability is that Microsoft has confirmed aggressive exploitation in the wild, but at this time there have been no patches released for Windows 10 32-bit or 64-bit systems,” said a leading cybersecurity engineer at Immersive. “The lack of patches leaves a significant gap in defense against a wider part of the Windows ecosystem.”

“Under certain memory operating conditions, it can be disabled so that an attacker can use it to execute code at the highest privilege level in the window. Importantly, an attacker does not need control to exploit the vulnerability.

The aggressive exploitation of flaws per Microsoft is linked to ransomware attacks on a small number of targets. This development prompted the US Cybersecurity and Infrastructure Security Agency (CISA) to add it to a known Exploited Vulnerability (KEV) catalogue that requires federal agencies to apply the fix by April 29, 2025.

Other notable vulnerabilities that Redmond patched this month include the security feature bypass (SFB) flaws affecting Windows Kerberos (CVE-2025-29809), and the remote code execution flaws in Windows Remote Desktop Services (CVE-2025-27480, CVE-2025-27482), and the Windows Lightweight Directory Access Tocot. (CVE-2025-26663, CVE-2025-26670)

It is also worth noting that multiple critical remote code execution flaws for Microsoft Office and Excel (CVE-2025-29791, CVE-2025-27748, CVE-2025-27748, CVE-2025-27748, CVE-2025-27748, CVE-2025-27752, and CVE-2025-27752.

Capping a list of critical flaws is two remote code execution vulnerabilities affecting Windows TCP/IP (CVE-2025-26686) and Windows Hyper-V (CVE-2025-27491), which can allow attackers to execute code on the network under certain conditions.

It is worth noting that some of the vulnerabilities have not yet received a patch for Windows 10. Microsoft said the update will be “released as soon as possible and if available, customers will be notified by a revision of this CVE information.”

Software patches from other vendors

In addition to Microsoft, security updates have also been released by other vendors over the past few weeks, rectifying some vulnerabilities.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleLuka Doncic has been kicked out. The Lakers lose to lightning because Shai has a score of 42 | Basketball news
Next Article Judge orders the White House to restore media access to US communications agencies | Press Freedom
user
  • Website

Related Posts

149 hacktivist DDoS attacks hit 110 organizations in 16 countries after Middle East conflict

March 4, 2026

Coruna iOS exploit kit uses 23 exploits across 5 chains targeting iOS 13 to 17.2.1

March 4, 2026

New RFP template for AI usage control and AI governance

March 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Anthropic CEO Dario Amodei calls OpenAI’s message about military agreement a ‘blatant lie,’ report says

Google settles with Epic Games, lowers Play Store fees to 20%

MacBook Neo, iPhone 17e, and everything else Apple announced this week

149 hacktivist DDoS attacks hit 110 organizations in 16 countries after Middle East conflict

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.