Impact
A flaw in Windows Shell allows an authorized attacker to expose sensitive information by spoofing file paths over a network. The vulnerability is a form of information exposure that can enable malicious viewers to trick users or systems into revealing confidential data. The description states that the attacker must already have authorized access, so no privilege escalation is required, but the impact is significant in contexts where sensitive data is displayed through the file explorer interface.
Affected Systems
Affected Windows 10 versions 1607, 1809, 21H2, and 22H2; Windows 11 versions 23H2, 24H2, 25H2, and 22H3; and a broad range of Windows Server releases from 2008 R2 SP1 to 2025, including both full and Server Core installations. All listed platforms are vulnerable.
Risk and Exploitability
The CVSS score of 6.5 indicates a medium risk level, and the EPSS score of less than 1% shows a very low probability of exploitation at this time. The vulnerability is not listed in the KEV catalog, suggesting no known active exploitation. The attack vector is inferred to be network-based via Windows Shell interactions, requiring the attacker to have already authorized access to the system. Overall, the risk is moderate but could be significant in high-value environments where file explorer spoofing could lead to data leaks.
OpenCVE Enrichment