Impact
This vulnerability arises from improper input validation within Windows Message Queuing. An attacker who is already authorized on a host can supply crafted input that bypasses validation checks, enabling them to elevate their local privileges. The primary consequence is that a user with limited rights can gain higher authority, potentially compromising the entire system. The weakness corresponds to CWE‑20, which covers improper input validation.
Affected Systems
The affected operating systems include Windows 10 from versions 1607 through 22H2 and several Windows Server releases: Windows Server 2008 R2 SP1, Windows Server 2008 SP2, Windows Server 2012, Windows Server 2012 R2, Windows Server 2016, and Windows Server 2019. All listed editions, including server core installations where applicable, are impacted.
Risk and Exploitability
The CVSS score of 7.8 indicates a high severity, while the very low EPSS (< 1 %) suggests that exploitation is unlikely in the wild at this time. Because the vulnerability requires an authorized local attacker, it is not detectable through remote exploits. The attack vector is local and would generally require the attacker to be on the target machine or have some pre‑existing user privileges. Given its absence from the KEV catalog, there is currently no known mass exploitation campaign targeting this flaw, but the impact remains significant if an attacker gains the necessary foothold.
OpenCVE Enrichment