Skip to content

Commit fceb431

Browse files
committed
feat(rules): Add Exploitation via Common Log File System rule
Identifies potential Common Log File System (CLFS) exploitation for privilege escalation by non-SYSTEM processes invoking CLFS log file API followed by the spawning of a child process with system privileges.
1 parent 62d964b commit fceb431

File tree

1 file changed

+33
-0
lines changed

1 file changed

+33
-0
lines changed
Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
name: Exploitation via Common Log File System
2+
id: 74624a2e-1ca6-4214-9065-9f96d60e9cc6
3+
version: 1.0.0
4+
description: |
5+
Identifies potential Common Log File System (CLFS) exploitation for
6+
privilege escalation by non-SYSTEM processes invoking CLFS log file
7+
API followed by the spawning of a child process with system privileges.
8+
labels:
9+
tactic.id: TA0004
10+
tactic.name: Privilege Escalation
11+
tactic.ref: https://attack.mitre.org/tactics/TA0004/
12+
technique.id: T1068
13+
technique.name: Exploitation for Privilege Escalation
14+
technique.ref: https://attack.mitre.org/techniques/T1068/
15+
references:
16+
- https://github.com/encrypter15/CVE-2025-29824
17+
- https://github.com/advisories/GHSA-74mq-6c57-fxpx
18+
- https://www.elastic.co/security-labs/itw-windows-lpe-0days-insights-and-detection-strategies
19+
20+
condition: >
21+
sequence
22+
maxspan 1m30s
23+
|((open_file) or (create_file)) and
24+
ps.sid != 'S-1-5-18' and
25+
thread.callstack.symbols imatches ('clfsw32.dll!CreateLogFile*', 'clfsw32.dll!AddLogContainerSet*')
26+
| by ps.uuid
27+
|spawn_process and (ps.sid = 'S-1-5-18' or ps.token.integrity_level = 'SYSTEM')| by ps.parent.uuid
28+
action:
29+
- name: kill
30+
31+
severity: high
32+
33+
min-engine-version: 3.0.0

0 commit comments

Comments
 (0)