Friday, February 21, 2025
HomeCyber Security NewsWindows Disk Cleanup Tool Exploit Allows SYSTEM Privilege Escalation

Windows Disk Cleanup Tool Exploit Allows SYSTEM Privilege Escalation

Published on

SIEM as a Service

Follow Us on Google News

Microsoft has urgently addressed a high-severity privilege escalation vulnerability (CVE-2025-21420) in the Windows Disk Cleanup Utility (cleanmgr.exe) during its February 2025 Patch Tuesday updates.

The flaw, scoring 7.8 on the CVSS scale, enabled attackers to execute malicious code with SYSTEM privileges through DLL sideloading techniques.

Technical Mechanism of the Exploit

The vulnerability leverages cleanmgr.exe’s privileged execution context to load unsigned DLLs.

Attackers could plant malicious libraries like dokannp1.dll in system directories through path interception or file replacement strategies. Security researchers demonstrated this via:

cp .\dokan1.dll C:\Users\<username>\System32\System32\System32\dokannp1.dll
cleanmgr /sageset:2

This code snippet bypasses signature validation checks by exploiting directory traversal vulnerabilities in the Disk Cleanup scheduler.

Successful exploitation required either manual triggering of the utility or automated execution through disk space thresholds, as reported by Cyber Security News.

The February 2025 update resolved 67 vulnerabilities across Windows components, including four zero-day flaws. Critical patches addressed:

Microsoft’s advisory emphasized immediate installation due to the active exploitation of CVE-2025-21418 and CVE-2025-21377.

Mitigation and Best Practices

Organizations should:

  1. Deploy the February 2025 patches via Windows Update or WSUS
  2. Audit system directories for unauthorized DLLs
  3. Implement an application that allows listing for system utilities

The full technical breakdown and mitigation guidance remains available through Microsoft Security Advisory ADV25002.

Security teams should prioritize auditing scheduled tasks and service configurations to prevent the recurrence of similar privilege escalation vectors.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response, and Threat Hunting - Register Here

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...