Impact
The Windows Client‑Side Caching (CSC) service contains a null pointer dereference that can be triggered by an authenticated local user. The flaw causes the service to execute code with the service’s elevated privileges, allowing an attacker to gain privileged access on the affected machine. This is a classic CWE‑476 null pointer dereference flaw.
Affected Systems
Microsoft Windows 10 (versions 1607, 1809, 21H2, 22H2) and Windows 11 (versions 23H2, 24H2, 25H2, 22H3) client releases, as well as all supported Windows Server editions from Server 2008 R2 SP1 through Server 2025, including Server Core installations. The CSC service is enabled by default and runs under a high‑privileged account, creating a broad attack surface if exploited.
Risk and Exploitability
The CVSS score of 7.8 classifies this vulnerability as moderately high risk, while the EPSS score of less than 1% indicates a very low probability of exploitation in current threat environments. The flaw requires local authenticated access and a running CSC service, making the attack vector likely local. The absence from CISA’s KEV catalog suggests no widespread exploitation reports have been recorded yet.
OpenCVE Enrichment