KB5058379: Windows Server 2025, Windows Server 2022 +4 more Security Update (May 2025)
A local elevation-of-privilege vulnerability in the Windows Common Log File System (CLFS) kernel driver, exploited in the wild prior to disclosure. A local attacker with code execution on the host can gain SYSTEM. Patched in the May 13 2025 Patch Tuesday cumulative for every supported Windows Server / client SKU.
A non-administrator user (or a process running as a low-privilege service account) who can run code on the host can use this flaw to escalate to NT AUTHORITY\SYSTEM. This is a typical post-initial-access step in ransomware and APT operator playbooks: the attacker lands as a normal user (phishing, drive-by, web shell on an unprivileged service) and uses a CLFS EoP to gain the SYSTEM token needed to disable EDR, harvest credentials from LSASS, or move laterally.
CVE-2025-32701 is one of two CLFS driver EoP zero-days fixed in May 2025 (the second is CVE-2025-32706). CLFS exposes a kernel-mode logging subsystem to user-mode callers via documented Win32 APIs; flaws in how the driver validates log-file state allow a local attacker who can invoke those APIs to corrupt kernel memory and execute code at ring 0.
Probably yes if any of these apply:
Affected OS versions
Microsoft flagged CVE-2025-32701 as Exploitation Detected at the May 13 2025 release. The CLFS driver has been a recurring target throughout 2025 — Microsoft also patched CVE-2025-29824 (CLFS EoP, exploited by Storm-2460 / PipeMagic) in the April 2025 Patch Tuesday, making May 2025 the third month with in-the-wild CLFS EoP fixes.
Manual download
For air-gapped servers or out-of-band deployment. Microsoft Update Catalog returns every OS-version variant of this update.
↗ Microsoft Update CatalogKB5058379Manual remediation steps
⏱ 30–60 minutes including rebootApply the Microsoft Security Update
Microsoft has released an official security update that fixes this vulnerability.
Required KB Updates
Supersedes: KB5055518, KB5055519, KB5055521, KB5055523, KB5055526, KB5055527, KB5055528, KB5055547, KB5055557, KB5055561, KB5055581, KB5055609
Affected Products
Fixed Build Numbers
Installation Methods
Windows Update (recommended)
Microsoft Update Catalog (manual download)
.msu installer with administrator privilegesWSUS / SCCM / Intune
Approve KB5058379 for the affected products in your update management console.
Microsoft Download Center Links
Verification
Confirm the update is installed:
Get-HotFix | Where-Object { $_.HotFixID -in @('KB5058379','KB5058383','KB5058384','KB5058385','KB5058387','KB5058392','KB5058403','KB5058405','KB5058411','KB5058429','KB5058430','KB5058449','KB5058451','KB5058454','KB5058497','KB5058500') }
References
Discovery Credit
Microsoft Threat Intelligence Center
No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.