Impact
The vulnerability is a use‑after‑free condition in Windows Shell that allows an authorized local attacker to elevate privileges by exploiting a memory corruption bug. This flaw could enable the attacker to perform actions with higher privileges, potentially affecting system integrity and availability. The weakness is identified as CWE‑416.
Affected Systems
Affected operating systems include Microsoft Windows 10 from version 1607 through 22H2, Windows 11 from version 23H2 through 25H2 and 22H3, and Windows Server 2016, 2019, 2022, 2025 including their core installations. Users of these versions are susceptible if they have not applied the relevant security update.
Risk and Exploitability
The CVSS score of 7.3 indicates a high severity while the EPSS score of less than 1% suggests a low likelihood of exploitation at this time. The vulnerability is not listed in the CISA KEV catalog, further indicating limited existing exploitation. The attack vector is local, requiring an attacker with authorized access to the system. Based on the description, it is inferred that exploiting the use‑after‑free likely involves triggering a specific action within Windows Shell or a related component.
OpenCVE Enrichment