Impact
The Windows Cloud Files Mini Filter Driver contains an untrusted pointer dereference flaw that permits an attacker with local user privileges to supply a crafted pointer. When the driver processes this pointer it dereferences it, which results in an elevation of local privileges. The flaw does not state that arbitrary code is executed, only that the attacker can gain higher‑level access to the system.
Affected Systems
Affected builds include Windows 10 versions 1809, 21H2, and 22H2; Windows 11 versions 22H3, 23H2, 24H2, and 25H2; as well as Windows Server 2019, Windows Server 2022 (including the 23H2 Server Core variant), and Windows Server 2025 (including Server Core). All systems running these builds without the applicable security update are vulnerable.
Risk and Exploitability
With a CVSS score of 7.8 the vulnerability is classified as high severity. The EPSS score of less than 1% indicates a very low current exploitation probability, yet the flaw permits local privilege escalation once triggered. While the CVE is not currently listed in the CISA KEV catalog and no public exploits have been reported, the combination of high impact and the ease of local exploitation demands timely remediation.
OpenCVE Enrichment