Impact
The vulnerability arises from sensitive information being written to a kernel log file, allowing an unauthorized local attacker to read that data and thereby gain access to confidential information. This vulnerability is based on CWE-532, which concerns information exposure through log files. This results in a loss of confidentiality and potentially the exposure of credentials or configuration details that are not meant for user access.
Affected Systems
Affected systems include Microsoft Windows Server 2016, 2019, 2022, and 2025 in both full and Server Core installations, as well as the 23H2 edition of Windows Server 2022 and the 23H2 edition of Windows Server 2025. All variants listed in the CVE are impacted.
Risk and Exploitability
The severity score is 6.2 on the CVSS scale, indicating a moderate impact. The EPSS score is less than 1%, reflecting a very low likelihood of widespread exploitation. The vulnerability is not currently cataloged in CISA’s Known Exploited Vulnerabilities list. Because it requires an attacker to have local access, the attack vector is local; an attacker would need to run code or have a user context that can read the kernel log file to extract the disclosed data.
OpenCVE Enrichment