Wednesday, May 14, 2025
HomeCyber Security NewsWindows Disk Cleanup Tool Exploit Allows SYSTEM Privilege Escalation

Windows Disk Cleanup Tool Exploit Allows SYSTEM Privilege Escalation

Published on

SIEM as a Service

Follow Us on Google News

Microsoft has urgently addressed a high-severity privilege escalation vulnerability (CVE-2025-21420) in the Windows Disk Cleanup Utility (cleanmgr.exe) during its February 2025 Patch Tuesday updates.

The flaw, scoring 7.8 on the CVSS scale, enabled attackers to execute malicious code with SYSTEM privileges through DLL sideloading techniques.

Technical Mechanism of the Exploit

The vulnerability leverages cleanmgr.exe’s privileged execution context to load unsigned DLLs.

- Advertisement - Google News

Attackers could plant malicious libraries like dokannp1.dll in system directories through path interception or file replacement strategies. Security researchers demonstrated this via:

cp .\dokan1.dll C:\Users\<username>\System32\System32\System32\dokannp1.dll
cleanmgr /sageset:2

This code snippet bypasses signature validation checks by exploiting directory traversal vulnerabilities in the Disk Cleanup scheduler.

Successful exploitation required either manual triggering of the utility or automated execution through disk space thresholds, as reported by Cyber Security News.

The February 2025 update resolved 67 vulnerabilities across Windows components, including four zero-day flaws. Critical patches addressed:

Microsoft’s advisory emphasized immediate installation due to the active exploitation of CVE-2025-21418 and CVE-2025-21377.

Mitigation and Best Practices

Organizations should:

  1. Deploy the February 2025 patches via Windows Update or WSUS
  2. Audit system directories for unauthorized DLLs
  3. Implement an application that allows listing for system utilities

The full technical breakdown and mitigation guidance remains available through Microsoft Security Advisory ADV25002.

Security teams should prioritize auditing scheduled tasks and service configurations to prevent the recurrence of similar privilege escalation vectors.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response, and Threat Hunting - Register Here

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Microsoft Patch Tuesday May 2025 Released With the Fixes for 72 Flaws With 5 Actively Exploited 0-Day

Microsoft has released its May 2025 Patch Tuesday updates, addressing 72 security vulnerabilities across...

Ivanti Released Security Updates to Fix for the Mutiple RCE Vulnerabilities – Patch Now

Ivanti, a leading enterprise software provider, has released critical security updates addressing vulnerabilities across...

Fortinet FortiVoice Zero-day Vulnerability Actively Exploited in The Wild

A critical stack-based buffer overflow vulnerability (CWE-121) has been discovered in multiple Fortinet products,...

Ransomware Attacks Surge by 123% Amid Evolving Tactics and Strategies

The 2025 Third-Party Breach Report from Black Kite highlights a staggering 123% surge in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Microsoft Patch Tuesday May 2025 Released With the Fixes for 72 Flaws With 5 Actively Exploited 0-Day

Microsoft has released its May 2025 Patch Tuesday updates, addressing 72 security vulnerabilities across...

Ivanti Released Security Updates to Fix for the Mutiple RCE Vulnerabilities – Patch Now

Ivanti, a leading enterprise software provider, has released critical security updates addressing vulnerabilities across...

Fortinet FortiVoice Zero-day Vulnerability Actively Exploited in The Wild

A critical stack-based buffer overflow vulnerability (CWE-121) has been discovered in multiple Fortinet products,...