Impact
The vulnerability is a protection mechanism failure in Windows Remote Assistance that allows an unauthorized attacker to bypass a local security feature. The flaw, classified as CWE‑693, indicates that the system does not reliably enforce the intended security checks, potentially permitting unauthorized use of Remote Assistance without the user’s consent.
Affected Systems
Microsoft Windows 10 versions 1607, 1809, 21H2, and 22H2; Windows 11 versions 22H3, 23H2, 24H2, and 25H2; Windows Server 2012 (including Server Core installations), 2012 R2 (including Server Core), 2016, 2019, and 2022; as well as Windows Server 2025 and the 23H2 edition Server Core installation. These encompass both x86 and x64 architectures, with ARM64 support for the newer Windows 11 releases.
Risk and Exploitability
The CVSS score is 5.5, placing the issue in the medium severity range, and the EPSS score is below 1 %, indicating a low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. An attacker who can locally access the machine may exploit the flaw to bypass the Remote Assistance security check, enabling the unauthorized initiation of Remote Assistance sessions without the user’s explicit consent.
OpenCVE Enrichment