Impact
An out-of-bounds read in the Capability Access Management Service (camsvc) allows an unauthorized local user to read memory that is not intended for that user, which can expose sensitive information such as system configuration or credentials. The vulnerability is limited to local execution and does not provide remote code execution or elevated privileges.
Affected Systems
Microsoft Windows 11 version 24H2, Microsoft Windows 11 version 25H2, Microsoft Windows Server 2025, and the Server Core installation of Windows Server 2025.
Risk and Exploitability
The CVSS score of 6.2 indicates a moderate severity, and the EPSS score of less than 1% suggests a low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog, and the attack vector is limited to local users who have the ability to interact with the camsvc service. Thus, the risk to the broader network is minimal but the local information disclosure can be significant for compromised hosts.
OpenCVE Enrichment