Impact
Out‑of‑bounds read in the Windows Cloud Files Mini Filter Driver creates a local privilege escalation scenario. When an authorized attacker triggers the bug, the driver reads memory beyond its bounds, which can allow the attacker to gain elevated rights on the affected system. This flaw—classified as CWE‑125—does not compromise confidentiality or integrity directly but provides the basis for non‑privileged users to perform actions typically reserved for administrative accounts.
Affected Systems
Microsoft Windows 10 versions 1809, 21H2, 22H2 and Windows 11 releases 22H3, 23H2, 24H2, 25H2, along with Windows Server 2019, Server 2022, and the forthcoming Windows Server 2025 are listed by the CNA as affected. These versions span both 32‑bit and 64‑bit architectures, including x86, x64, ARM64, and Server Core installations. The vulnerability is only present in the default configurations of these operating systems and is not limited to a subset of features.
Risk and Exploitability
The CVSS score of 7.8 highlights the high severity of this local privilege escalation while the EPSS of < 1 % indicates a very low probability of exploitation in observed attack data. It is not yet catalogued in the CISA KEV list. Because the attack requires local authorization, the threat is confined to situations where an attacker gains initial foothold on the machine. If such foothold exists, the flaw can be leveraged to bypass restrictions and compromise the entire system.
OpenCVE Enrichment