Impact
The vulnerability is a time‑of‑check time‑of‑use race condition in the Windows kernel memory allocator. An attacker who already has local authorization can trigger the race to manipulate kernel memory structures, allowing elevation of privilege to SYSTEM level. This is a critical local privilege escalation flaw (CWE‑122 and CWE‑367).
Affected Systems
Windows 10 (1607, 1809, 21H2, 22H2) and Windows 11 (22H3, 23H2, 24H2, 25H2) on both 32‑bit and 64‑bit builds, as well as Windows Server 2012 R2, 2016, 2019, 2022 and 2025, including core installations.
Risk and Exploitability
The CVSS base score is 7.8, the EPSS score is <1 %, and the vulnerability is not listed in the CISA KEV catalog. The attack is local and requires an authenticated user to craft a race condition, which can lead to full privilege elevation. Although the probability of exploitation is low, the impact of a successful exploit is high because it grants SYSTEM access, allowing complete control over the affected machine.
OpenCVE Enrichment