{"id":"CVE-2025-29824","details":"Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.","modified":"2026-05-04T08:50:16.789275Z","published":"2025-04-08T18:16:08.340Z","withdrawn":"2026-05-04T08:50:16.789275Z","references":[{"type":"WEB","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-29824"},{"type":"ADVISORY","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29824"},{"type":"EVIDENCE","url":"https://www.vicarius.io/vsociety/posts/cve-2025-29824-windows-common-log-file-system-driver-elevation-of-privilege-vulnerability-detection-script"},{"type":"EVIDENCE","url":"https://www.vicarius.io/vsociety/posts/cve-2025-29824-windows-common-log-file-system-driver-elevation-of-privilege-vulnerability-mitigation-script"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-29824.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"10.0.10240.20978"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.10240.20978"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.14393.7969"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.14393.7969"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.17763.7136"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.17763.7136"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.19044.5737"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.19044.5737"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.19044.5737"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.19045.5737"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.19045.5737"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.19045.5737"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.22621.5189"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.22621.5189"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.22631.5189"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.22631.5189"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.26100.3775"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.26100.3775"}]},{"events":[{"introduced":"0"},{"last_affected":"r2-sp1"}]},{"events":[{"introduced":"0"},{"last_affected":"r2"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.14393.7969"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.17763.7136"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.20348.3453"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.25398.1551"}]},{"events":[{"introduced":"0"},{"fixed":"10.0.26100.3775"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}