Impact
An elevation of privilege vulnerability exists in the Windows Remote Procedure Call (RPC) interface that interprets Interface Definition Language (IDL) data. The flaw can trigger a double‑free error (CWE‑415) during RPC processing, potentially allowing a malicious actor to gain higher privileges or execute arbitrary code on the affected Windows system. Based on the description and typical RPC usage, the attack likely requires sending crafted RPC requests either over a network or from a local process, but the exact requirement is not explicitly detailed and is inferred from the nature of the vulnerability.
Affected Systems
Microsoft Windows 10 versions 1607, 1809, 21H2, 22H2; Windows 11 versions 23H2, 24H2, 25H2, 22H3; Windows Server 2016, 2019, 2022, 2025. Affected platforms include x64, x86, and arm64 architectures as listed in the CPE data.
Risk and Exploitability
The vulnerability carries a CVSS score of 7.8, indicating high severity, while the EPSS score is less than 1%, suggesting a low probability of exploitation at this time. It is not listed in the CISA KEV catalog. Because the flaw involves RPC IDL handling, an attacker could potentially gain elevated privileges through remote RPC calls or local malicious data inputs, depending on the system configuration. The overall risk is moderate, driven mainly by the high severity rating and the potential impact of privilege escalation.
OpenCVE Enrichment