Impact
Improper input validation in Windows LDAP allows an authorized attacker to tamper with LDAP entries over the network. This vulnerability can lead to unauthorized modification of directory data, potentially impacting authentication, authorization, or other services that rely on LDAP. The weakness corresponds to insecure input processing (CWE‑20).
Affected Systems
Microsoft Windows 10 versions 1607, 1809, 21H2, 22H2; Windows 11 versions 23H2, 24H2, 25H2, 22H3; Windows Server 2016, 2019, 2022, 2025. All 32‑bit, 64‑bit, and ARM variants are listed in the CNA affected products. No specific sub‑release version constraints are publicly documented beyond the editions noted.
Risk and Exploitability
The CVSS score of 6.5 indicates a moderate severity. EPSS indicates a very small exploitation probability (<1%). The vulnerability is not in the KEV catalog, suggesting limited known exploitation activity. An attack requires an authenticated user with sufficient privileges and network access to the LDAP service; the attacker can submit crafted LDAP requests that bypass validation checks to modify directory entries.
OpenCVE Enrichment