Impact
This vulnerability is a race condition in the Windows Shell that permits an authorized user to elevate their local privileges. The flaw is a classic concurrency issue (CWE‑362) in which improper synchronization of a shared resource allows privilege escalation to happen without authentication or remote access.
Affected Systems
Affected Microsoft products include Windows 10 releases 1607, 1809, 21H2, 22H2; Windows 11 releases 23H2, 24H2, 25H2, 22H3; and Windows Server editions 2016, 2019, 2022, 2025, including Server Core installations. All listed x86, x64, arm64 architectures are vulnerable.
Risk and Exploitability
The CVSS score of 7.8 indicates high severity, yet the EPSS score is below 1%, suggesting a low probability of exploitation in the wild, and the vulnerability is not in the CISA KEV catalog. The attack vector is inferred to be local: an attacker must have some level of authorized system access to trigger the race condition within the Windows Shell. No public exploit has been disclosed, but the described conditions imply that any routine operation that invokes the Windows Shell could be abused to gain elevated privileges.
OpenCVE Enrichment