Impact
A heap‑based buffer overflow in the Windows Common Log File System Driver can be exploited by an attacker who has local authorized access to the system to gain higher privileges. The flaw may enable the attacker to run code with elevated rights, potentially compromising system integrity and confidentiality. The weakness is a classic heap overflow, allowing overwrite of memory beyond allocated bounds, which is consistent with CWE‑122.
Affected Systems
Affected are Microsoft Windows operating systems, including Windows 10 versions 1607, 1809, 21H2, 22H2; Windows 11 versions 22H3, 23H2, 24H2, 25H2; and Windows Server releases from 2008 R2 Service Pack 1 through Server 2025. Both 32‑bit (x86) and 64‑bit (x64) architectures are impacted, as are ARM64 variants where applicable.
Risk and Exploitability
The CVSS score of 7.8 indicates a high severity. However, the EPSS score is below 1%, suggesting that the exploitation probability is very low at present. The vulnerability is not listed in the CISA KEV catalog, meaning it has not yet been observed in widespread attacks. The likely attack vector is a local user with authorized privileges, which implies that the attacker must already have some degree of access to the target machine.
OpenCVE Enrichment