Impact
This vulnerability is a race condition in the Graphics kernel where concurrent execution with improper synchronization allows an authorized local user to gain elevated privileges. The flaw resides in how the kernel handles shared resources during graphics processing. Exploitation could enable the attacker to break out of a restricted user context and obtain system‑level privileges, affecting confidentiality, integrity, and availability of the device.
Affected Systems
The flaw affects Microsoft Windows products. On client OSes it includes Windows 10 from version 1607 through 22H2 and Windows 11 from 22H3 through 25H2. Server editions affected are Windows Server 2016, 2019, 2022, and 2025, including their Server Core installations.
Risk and Exploitability
The CVSS score of 7 indicates a high severity local attack. The EPSS score is below 1 %, implying that the likelihood of exploitation observed in the wild is very low. The vulnerability is not listed in the CISA KEV catalog. Attackers would need local access and the ability to execute code in the user context; the system must be running one of the affected Windows or Windows Server versions. The race condition requires that the attacker triggers the improper synchronization while the kernel processes graphics requests. The exact exploitation technique has not been publicly disclosed, but the flaw would enable a privileged escalation from an authorized local user.
OpenCVE Enrichment