Impact
A use‑after‑free flaw in Windows kernel‑mode drivers allows an authorized user to raise privileges locally, potentially enabling the execution of arbitrary code with elevated rights. This vulnerability is classified as CWE‑416.
Affected Systems
Affected systems include Microsoft Windows 11 versions 24H2 and 25H2, as well as Microsoft Windows Server 2025, including Server Core installations.
Risk and Exploitability
The CVSS base score of 7.8 indicates a high severity of local privilege escalation. The EPSS score of less than 1% suggests that exploitation is unlikely at this time, and the vulnerability is not currently listed in the CISA KEV catalog. Exploitation requires local access and privileged user context to trigger the use‑after‑free condition; therefore the attack vector is inferred to be local. Once exploited, the attacker could obtain system‑wide privileges, compromising confidentiality, integrity, and availability of the affected machine.
OpenCVE Enrichment