Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

Did the US flinch first in tariff war with China? | Trade War News

May 14, 2025

Tensor9 helps vendors deploy their software into any environment using digital twins

May 14, 2025

Databricks to buy open-source database startup Neon for $1B

May 14, 2025
Facebook X (Twitter) Instagram
Trending
  • Did the US flinch first in tariff war with China? | Trade War News
  • Tensor9 helps vendors deploy their software into any environment using digital twins
  • Databricks to buy open-source database startup Neon for $1B
  • Kosovar Administrator of Cybercrime Marketplace Extradited to US
  • TensorWave raises $100M to grow its AMD-powered cloud infrastructure
  • Vulnerabilities Patched by Juniper, VMware and Zoom 
  • Fortinet Patches Zero-Day Exploited Against FortiVoice Appliances
  • Resilience launches AI-powered Cyber Risk Calculator to quantify financial cyber exposure
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Wednesday, May 14
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » Microsoft Patches 125 Windows Vulns, Including Exploited CLFS Zero-Day
Cybersecurity

Microsoft Patches 125 Windows Vulns, Including Exploited CLFS Zero-Day

adminBy adminApril 8, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 18


Microsoft on Tuesday shipped urgent updates for at least 120 Windows vulnerabilities, including a zero-day in the Windows Common Log File System (CLFS) marked as “actively exploited.”

The CLFS zero-day, tagged as CVE-2025-29824, allows a local attacker to gain SYSTEM privileges by exploiting a use-after-free bug, Redmond’s security response team warned.

The issue carries a CVSS severity score of 7.8/10 and requires only low-level privileges with no user interaction. 

Microsoft credited its internal threat intelligence team with discovering the issue, suggesting it was being exploited by professional hacking teams. The software maker said a patch for Windows 10 is not yet available and will be shipped at a later date.

In separate documentation, Microsoft blamed a ransomware group for the attacks and said targets include organizations in the information technology (IT) and real estate sectors of the United States, the financial sector in Venezuela, a Spanish software company, and the retail sector in Saudi Arabia. 

“In addition to discovering the vulnerability, Microsoft also found that the exploit has been deployed by PipeMagic malware. Microsoft is attributing the exploitation activity to Storm-2460, which also used PipeMagic to deploy ransomware,” the company said.

Over the last few years, there have been at least 26 documented vulnerabilities in the Windows CLFS subsystem used for data and event logging and Microsoft has responded with a major new security mitigation to block these attacks.

The company’s plans include the addition of Hash-based Message Authentication Codes (HMAC) to detect unauthorized modifications to CLFS log files and cover one of the most attractive attack surfaces for APTs and ransomware attacks.

Advertisement. Scroll to continue reading.

The monster Patch Tuesday rollout also includes fixes for a use-after-free memory corruption flaw in Windows Hyper-V that allows an authorized attacker to execute code over a network. The issue is rated critical and carries remote code execution risks.

Microsoft also documented a pair of critical remote code execution flaws haunting its Windows Remote Desktop Services and warned that unauthorized attackers can execute code over a network.

The Microsoft Excel spreadsheet product also received a major security makeover to cover at least three vulnerabilities that the company says introduced remote code execution risks.

The company also fixed critical issues with remote code execution paths in the Microsoft Office productivity suite. 

In addition to Microsoft, Adobe also released a massive batch of security updates alongside warnings that critical-severity vulnerabilities can be exploited to remotely take control of computer systems.

The Adobe Patch Tuesday rollout covers a total of 54 documented bugs and addresses major code execution defects in enterprise-facing products like Adobe ColdFusion, Adobe FrameMaker, Adobe Photoshop and Adobe Commerce.

The company called urgent attention to a fix for the ColdFusion web development platform, warning that at least 15 documented vulnerabilities put organizations at risk to arbitrary file system read, arbitrary code execution and security feature bypasses.

Related: Microsoft Patches Another Already-Exploited Windows Zero-Day

Related: Microsoft Ships Urgent Patch for Exploited Windows CLFS Zero-Day

Related: Microsoft Tackling Windows Logfile Flaws With New Mitigation

Related: Microsoft Patches Windows Zero-Day Exploited by Russian Hackers



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

Kosovar Administrator of Cybercrime Marketplace Extradited to US

May 14, 2025

Vulnerabilities Patched by Juniper, VMware and Zoom 

May 14, 2025

Fortinet Patches Zero-Day Exploited Against FortiVoice Appliances

May 14, 2025

Ivanti Patches Two EPMM Zero-Days Exploited to Hack Customers

May 14, 2025

ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Phoenix Contact 

May 14, 2025

Adobe Patches Big Batch of Critical-Severity Software Flaws

May 13, 2025
Add A Comment
Leave A Reply Cancel Reply

Don't Miss
Billionaires

Skechers’ Greenbergs Set To Pocket Up To $1.1 Billion From Sale To 3G

May 6, 2025

Skechers founders Robert Greenberg (left) and Michael Greenberg (right) started the brand more than 30…

Trump Organization Admits President Still Controls His Business

May 6, 2025

Forbes Richest Person In Every State 2025

April 30, 2025

These Billionaire Signers Of The Giving Pledge Signers On Why The Philanthropy Group Still Matters

April 29, 2025
Our Picks

Did the US flinch first in tariff war with China? | Trade War News

May 14, 2025

Tensor9 helps vendors deploy their software into any environment using digital twins

May 14, 2025

Databricks to buy open-source database startup Neon for $1B

May 14, 2025

Kosovar Administrator of Cybercrime Marketplace Extradited to US

May 14, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

Tensor9 helps vendors deploy their software into any environment using digital twins

May 14, 2025

Databricks to buy open-source database startup Neon for $1B

May 14, 2025

TensorWave raises $100M to grow its AMD-powered cloud infrastructure

May 14, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.