KB5058383: Windows Server 2016 Security Update (May 2025)
A local attacker can escalate to SYSTEM by exploiting a heap overflow in the Windows CLFS driver — confirmed exploited in the wild as a zero-day.
An attacker who already has any code execution on the host — a phished standard user, a low-privileged service account — can craft a malicious CLFS log file, trigger the kernel heap overflow, and escalate to SYSTEM. From SYSTEM they dump LSASS for credentials, disable security tooling, and deploy ransomware. This is the classic "second stage" of an intrusion: phish to land, CLFS to become SYSTEM.
The Common Log File System (CLFS) driver (clfs.sys) is a kernel component that manages transaction logs for applications and the OS; it runs on every Windows Server and cannot be disabled. An improper-input-validation flaw lets an attacker craft or modify a CLFS log file to trigger a heap-based buffer overflow in kernel memory. CLFS has been a recurring privilege-escalation target — this is one of several clfs.sys zero-days exploited in 2024-2025.
Probably yes if any of these apply:
Affected OS versions
A ransomware affiliate phishes an employee and lands code as a normal user. They drop a crafted CLFS log file, trigger CVE-2025-32706, and become SYSTEM on the workstation — then pivot to the file server and domain controller. Microsoft and CISA confirmed this exact pattern in the wild before the May 2025 patch; CLFS zero-days are a staple of ransomware operators precisely because the driver is everywhere and the escalation is reliable.
Manual download
For air-gapped servers or out-of-band deployment. Microsoft Update Catalog returns every OS-version variant of this update.
↗ Microsoft Update CatalogKB5058383Manual remediation steps
Prerequisites
Estimated time
20–40 minutes per server (download + install + reboot)
Reboot required
Yes — install the cumulative update and reboot the server before the fix is active.
Steps
1. Confirm the server is missing the patch
Get-HotFix -Id KB5058383 -ErrorAction SilentlyContinue
2. Install the update — pick one channel
Windows Update / WSUS (preferred):
UsoClient ScanInstallWait
Manual download (offline / air-gapped):
3. Reboot
Restart-Computer -Force
Verification
Get-HotFix -Id KB5058383
[System.Environment]::OSVersion.Version
Rollback
wusa.exe /uninstall /kb:5058383 /quiet /norestart
Notes
No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.