Friday, February 21, 2025
HomeCyber Security NewsWindows Disk Cleanup Tool Exploit Allows SYSTEM Privilege Escalation

Windows Disk Cleanup Tool Exploit Allows SYSTEM Privilege Escalation

Published on

SIEM as a Service

Follow Us on Google News

Microsoft has urgently addressed a high-severity privilege escalation vulnerability (CVE-2025-21420) in the Windows Disk Cleanup Utility (cleanmgr.exe) during its February 2025 Patch Tuesday updates.

The flaw, scoring 7.8 on the CVSS scale, enabled attackers to execute malicious code with SYSTEM privileges through DLL sideloading techniques.

Technical Mechanism of the Exploit

The vulnerability leverages cleanmgr.exe’s privileged execution context to load unsigned DLLs.

Attackers could plant malicious libraries like dokannp1.dll in system directories through path interception or file replacement strategies. Security researchers demonstrated this via:

cp .\dokan1.dll C:\Users\<username>\System32\System32\System32\dokannp1.dll
cleanmgr /sageset:2

This code snippet bypasses signature validation checks by exploiting directory traversal vulnerabilities in the Disk Cleanup scheduler.

Successful exploitation required either manual triggering of the utility or automated execution through disk space thresholds, as reported by Cyber Security News.

The February 2025 update resolved 67 vulnerabilities across Windows components, including four zero-day flaws. Critical patches addressed:

Microsoft’s advisory emphasized immediate installation due to the active exploitation of CVE-2025-21418 and CVE-2025-21377.

Mitigation and Best Practices

Organizations should:

  1. Deploy the February 2025 patches via Windows Update or WSUS
  2. Audit system directories for unauthorized DLLs
  3. Implement an application that allows listing for system utilities

The full technical breakdown and mitigation guidance remains available through Microsoft Security Advisory ADV25002.

Security teams should prioritize auditing scheduled tasks and service configurations to prevent the recurrence of similar privilege escalation vectors.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response, and Threat Hunting - Register Here

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Nagios XI Flaw Exposes User Details and Emails to Unauthenticated Attackers”

A security vulnerability in Nagios XI 2024R1.2.2, tracked as CVE-2024-54961, has been disclosed, allowing...

Critical UniFi Protect Camera Vulnerability Enables Remote Code Execution Attacks

Ubiquiti Networks has issued an urgent security advisory (Bulletin 046) warning of multiple critical...

Critical Vulnerability in Fluent Bit Exposes Cloud Services to Potential Cyber Attacks

A critical security flaw in Fluent Bit, a widely adopted log processing and metrics...

New Darcula 3.0 Tool Generates Phishing Kits to Mimic Global Brands

The cybercriminal group behind the notorious "darcula-suite" platform has unveiled its latest iteration, darcula...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Nagios XI Flaw Exposes User Details and Emails to Unauthenticated Attackers”

A security vulnerability in Nagios XI 2024R1.2.2, tracked as CVE-2024-54961, has been disclosed, allowing...

Critical UniFi Protect Camera Vulnerability Enables Remote Code Execution Attacks

Ubiquiti Networks has issued an urgent security advisory (Bulletin 046) warning of multiple critical...

Critical Vulnerability in Fluent Bit Exposes Cloud Services to Potential Cyber Attacks

A critical security flaw in Fluent Bit, a widely adopted log processing and metrics...