Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

Hitachi ZeroCarbon and MUFG partner to remove cost barriers for fleet electrification

May 14, 2025

OpenAI pledges to publish AI safety test results more often

May 14, 2025

Stability AI releases an audio-generating model that can run on smartphones

May 14, 2025
Facebook X (Twitter) Instagram
Trending
  • Hitachi ZeroCarbon and MUFG partner to remove cost barriers for fleet electrification
  • OpenAI pledges to publish AI safety test results more often
  • Stability AI releases an audio-generating model that can run on smartphones
  • Dawn employee first Pakistani to win top prize for AIPS young reporters writing award – Sport
  • Chipmaker Patch Tuesday: Intel, AMD, Arm Respond to New CPU Attacks
  • Did the US flinch first in tariff war with China? | Trade War News
  • Tensor9 helps vendors deploy their software into any environment using digital twins
  • Databricks to buy open-source database startup Neon for $1B
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Wednesday, May 14
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » Microsoft Patches 125 Windows Vulns, Including Exploited CLFS Zero-Day
Cybersecurity

Microsoft Patches 125 Windows Vulns, Including Exploited CLFS Zero-Day

adminBy adminApril 8, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 19


Microsoft on Tuesday shipped urgent updates for at least 120 Windows vulnerabilities, including a zero-day in the Windows Common Log File System (CLFS) marked as “actively exploited.”

The CLFS zero-day, tagged as CVE-2025-29824, allows a local attacker to gain SYSTEM privileges by exploiting a use-after-free bug, Redmond’s security response team warned.

The issue carries a CVSS severity score of 7.8/10 and requires only low-level privileges with no user interaction. 

Microsoft credited its internal threat intelligence team with discovering the issue, suggesting it was being exploited by professional hacking teams. The software maker said a patch for Windows 10 is not yet available and will be shipped at a later date.

In separate documentation, Microsoft blamed a ransomware group for the attacks and said targets include organizations in the information technology (IT) and real estate sectors of the United States, the financial sector in Venezuela, a Spanish software company, and the retail sector in Saudi Arabia. 

“In addition to discovering the vulnerability, Microsoft also found that the exploit has been deployed by PipeMagic malware. Microsoft is attributing the exploitation activity to Storm-2460, which also used PipeMagic to deploy ransomware,” the company said.

Over the last few years, there have been at least 26 documented vulnerabilities in the Windows CLFS subsystem used for data and event logging and Microsoft has responded with a major new security mitigation to block these attacks.

The company’s plans include the addition of Hash-based Message Authentication Codes (HMAC) to detect unauthorized modifications to CLFS log files and cover one of the most attractive attack surfaces for APTs and ransomware attacks.

Advertisement. Scroll to continue reading.

The monster Patch Tuesday rollout also includes fixes for a use-after-free memory corruption flaw in Windows Hyper-V that allows an authorized attacker to execute code over a network. The issue is rated critical and carries remote code execution risks.

Microsoft also documented a pair of critical remote code execution flaws haunting its Windows Remote Desktop Services and warned that unauthorized attackers can execute code over a network.

The Microsoft Excel spreadsheet product also received a major security makeover to cover at least three vulnerabilities that the company says introduced remote code execution risks.

The company also fixed critical issues with remote code execution paths in the Microsoft Office productivity suite. 

In addition to Microsoft, Adobe also released a massive batch of security updates alongside warnings that critical-severity vulnerabilities can be exploited to remotely take control of computer systems.

The Adobe Patch Tuesday rollout covers a total of 54 documented bugs and addresses major code execution defects in enterprise-facing products like Adobe ColdFusion, Adobe FrameMaker, Adobe Photoshop and Adobe Commerce.

The company called urgent attention to a fix for the ColdFusion web development platform, warning that at least 15 documented vulnerabilities put organizations at risk to arbitrary file system read, arbitrary code execution and security feature bypasses.

Related: Microsoft Patches Another Already-Exploited Windows Zero-Day

Related: Microsoft Ships Urgent Patch for Exploited Windows CLFS Zero-Day

Related: Microsoft Tackling Windows Logfile Flaws With New Mitigation

Related: Microsoft Patches Windows Zero-Day Exploited by Russian Hackers



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

Chipmaker Patch Tuesday: Intel, AMD, Arm Respond to New CPU Attacks

May 14, 2025

Kosovar Administrator of Cybercrime Marketplace Extradited to US

May 14, 2025

EU Cybersecurity Agency ENISA Launches European Vulnerability Database

May 14, 2025

Vulnerabilities Patched by Juniper, VMware and Zoom 

May 14, 2025

Fortinet Patches Zero-Day Exploited Against FortiVoice Appliances

May 14, 2025

Ivanti Patches Two EPMM Zero-Days Exploited to Hack Customers

May 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Don't Miss
Billionaires

Skechers’ Greenbergs Set To Pocket Up To $1.1 Billion From Sale To 3G

May 6, 2025

Skechers founders Robert Greenberg (left) and Michael Greenberg (right) started the brand more than 30…

Trump Organization Admits President Still Controls His Business

May 6, 2025

Forbes Richest Person In Every State 2025

April 30, 2025

These Billionaire Signers Of The Giving Pledge Signers On Why The Philanthropy Group Still Matters

April 29, 2025
Our Picks

Hitachi ZeroCarbon and MUFG partner to remove cost barriers for fleet electrification

May 14, 2025

OpenAI pledges to publish AI safety test results more often

May 14, 2025

Stability AI releases an audio-generating model that can run on smartphones

May 14, 2025

Dawn employee first Pakistani to win top prize for AIPS young reporters writing award – Sport

May 14, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

OpenAI pledges to publish AI safety test results more often

May 14, 2025

Stability AI releases an audio-generating model that can run on smartphones

May 14, 2025

Tensor9 helps vendors deploy their software into any environment using digital twins

May 14, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.