⚠ Actively exploited in ransomware campaigns
This vulnerability is on the CISA Known Exploited Vulnerabilities list and has been used in known ransomware attacks. CISA required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.. Due date: 2025-04-29.
CVE-2025-29824 — Use After Free in Microsoft Windows 10 Version 1507
Severity
7.8HIGHNVD
EPSS
0.4%
top 39.76%
CISA KEV
KEVRansomware
Added 2025-04-08
Due 2025-04-29
Exploit
No known exploits
Affected products
Timeline
PublishedApr 8
KEV addedApr 8
KEV dueApr 29
Latest updateFeb 2
CISA Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Description
Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages26 packages
🔴Vulnerability Details
3GHSA▶
GHSA-74mq-6c57-fxpx: Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally↗2025-04-08