driver vulnerability

Winsage
May 7, 2025
The Play ransomware gang exploited a critical vulnerability in the Windows Common Log File System, identified as CVE-2025-29824, which has a CVSS score of 7.8 and is categorized as a "Use after free" vulnerability. This flaw allows an authorized attacker to elevate privileges locally and has been confirmed to be exploited in real-world attacks. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added it to its Known Exploited Vulnerabilities catalog in April. Microsoft addressed this vulnerability during its April Patch Tuesday security updates, acknowledging its exploitation in limited attacks targeting various sectors in the U.S. and Saudi Arabia. Researchers from Symantec reported that the Play ransomware gang used the CVE-2025-29824 exploit in an attack against a U.S. organization before the public disclosure and patching of the vulnerability. The attackers utilized the Grixba infostealer tool and initially exploited a public-facing Cisco ASA firewall to gain entry. They deployed tools to gather information, escalated privileges using the CVE-2025-29824 exploit, and executed malicious scripts to steal credentials. The exploit took advantage of race conditions in driver memory handling, allowing kernel access and manipulation of files. Before the patch was released, the exploit was reportedly used by multiple threat actors, and Microsoft linked it to other malware.
Winsage
March 16, 2025
A recent issue has arisen where Microsoft Defender is mistakenly flagging popular hardware monitoring applications from vendors like Razer and SteelSeries as malware. This is due to concerns regarding a driver called HackTool:Win32/Winring0, linked to the WinRing0x64.sys system driver, which is essential for these applications. The developer of the FanControl application acknowledged that the WinRing0x64.sys driver has a known vulnerability, CVE-2020-14979, that has not been addressed. Razer has implemented a patch to eliminate the use of this driver in its Synapse software. Users may need to contact vendors for updates or choose between ignoring Defender's warnings or discontinuing use of the applications.
Search