Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Windows 10 Version 1507 | 10.0.10240.0 |
| Microsoft | Windows 10 Version 1607 | 10.0.14393.0 |
| Microsoft | Windows 10 Version 1809 | 10.0.17763.0 |
| Microsoft | Windows 10 Version 21H2 | 10.0.19044.0 |
| Microsoft | Windows 10 Version 22H2 | 10.0.19045.0 |
| Microsoft | Windows 11 version 22H2 | 10.0.22621.0 |
| Microsoft | Windows 11 version 22H3 | 10.0.22631.0 |
| Microsoft | Windows 11 Version 23H2 | 10.0.22631.0 |
| Microsoft | Windows 11 Version 24H2 | 10.0.26100.0 |
| Microsoft | Windows Server 2008 R2 Service Pack 1 | 6.1.7601.0 |
| Microsoft | Windows Server 2008 R2 Service Pack 1 (Server Core installation) | 6.1.7601.0 |
| Microsoft | Windows Server 2008 Service Pack 2 | 6.0.6003.0 |
| Microsoft | Windows Server 2008 Service Pack 2 (Server Core installation) | 6.0.6003.0 |
| Microsoft | Windows Server 2012 | 6.2.9200.0 |
| Microsoft | Windows Server 2012 (Server Core installation) | 6.2.9200.0 |
| Microsoft | Windows Server 2012 R2 | 6.3.9600.0 |
| Microsoft | Windows Server 2012 R2 (Server Core installation) | 6.3.9600.0 |
| Microsoft | Windows Server 2016 | 10.0.14393.0 |
| Microsoft | Windows Server 2016 (Server Core installation) | 10.0.14393.0 |
| Microsoft | Windows Server 2019 | 10.0.17763.0 |
| Microsoft | Windows Server 2019 (Server Core installation) | 10.0.17763.0 |
| Microsoft | Windows Server 2022 | 10.0.20348.0 |
| Microsoft | Windows Server 2022, 23H2 Edition (Server Core installation) | 10.0.25398.0 |
| Microsoft | Windows Server 2025 | 10.0.26100.0 |
| Microsoft | Windows Server 2025 (Server Core installation) | 10.0.26100.0 |
Yes — actively exploited. Added to the CISA KEV catalog on 2025-04-08. Ransomware use: Known.
For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:
No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.