Windows under attack: 0-day vulnerability used by ransomware group
Microsoft released security updates for Windows yesterday and revealed today that the updates include a patch for a 0-day issue that is exploited in the wild.
The vulnerability -- Windows Common Log File System Driver Elevation of Privilege Vulnerability -- is tracked as CVE-2025-29824.
Important information:
- The issue affects most supported server and client versions of Windows, including Windows 10, Windows 11, and Windows Server 2025.
- Microsoft notes that the exploit does not work in Windows 11, version 24H2.
- It is a use-after-free security issue that may be exploited for local elevation attacks.
- The attack does not require user interaction.
- The attacker may gain system privileges upon successful exploitation.
Microsoft notes that it is aware of limited attacks. It mentions targets in the IT and real estate sectors in the United States, the financial sector in Venezuela, a Spanish software company, and the retail sector in Saudi Arabia specifically in a special announcement on its security website.
Installation of the update protects systems against exploits. Microsoft's guidance includes an ominous note revealing that the company is delaying the patch for Windows 10 systems. It does not provide an explanation for the delay. Affected users and administrators are asked to monitor the official CVE on Microsoft's MSRC website for updates regarding the rollout of the patch to Windows 10 systems.
Home users may use Windows Update to install the patch immediately on Windows 11. This is done via Settings > Windows Update. Note that a restart of the system is necessary to finalize the installation of the security update.
On the technical side, the vulnerability is found in the Common Log File System (CLFS) kernel driver according to Microsoft. The company says that has not determined the initial attack vector, but discovered "some notable pre-exploitation behaviors by Storm-2460".
Good to known: Storm 2460, which is better known as RansomEXX, is a notorious ransomware group.
Microsoft observed the following behavior in multiple cases:
- The threat actor uses the certutil tool to download a malicious file from a legitimate but compromised third-party website.
- The downloaded file was a malicious MSBuild file.
- The malware in question goes by the name PipeMagic, which has been known since 2023.
- After deployment of the malware, it is exploiting the vulnerability described in this guide for process injection into system processes.
One of the activities of the malware on the user system is the dumping and parsing of LSASS memory to obtain user credentials. Ransomware activity followed on the target systems, notably file encryption and the adding of random extensions.
Closing Words
Microsoft recommends to install the Windows security patches immediately to protect systems from exploit attempts. The delay on Windows 10 is unfortunate, as it means that systems remain vulnerable to attacks until Microsoft releases the patch for the system.
Now You: when do you install updates on your systems? Did you install the April 2025 security updates already?
RECOMMENDED NEWS
Google says hackers used app specific passwords to bypass MFA in a targeted attack
Google has published an article that confirms hackers bypassed Gmail's multifactor authentication (...
Mozilla VPN: security audit results and new features announced
Mozilla published the results of a security audit of its Mozilla VPN service last week. The organiz...
You should now be able to get Windows 11 Version 23H2, if you have not already
Microsoft released Windows 11 version 23H2 last year to the public. It,, and the Moments Update tha...
Windows 10: ESU-bypass to extend updates is working already reportedly
Microsoft's Windows 10 operating system reaches end of support in October 2025. This means no updat...
This unofficial open source YouTube Music app gives you the best experience
Google's video hosting and streaming service YouTube offers one of the largest selections of music ...
Oblivion Remastered update breaks DLSS and Frame Gen on PC
The recent update for The Elder Scrolls 4: Oblivion Remastered has raised concerns among players us...
Comments on "Windows under attack: 0-day vulnerability used by ransomware group" :