Impact
A heap-based buffer overflow in the Windows Virtualization-Based Security (VBS) enclave allows an attacker who already has local access to elevate privileges. The flaw enables the attacker to corrupt memory within the enclave runtime and execute arbitrary code with higher privilege levels, potentially compromising system integrity and confidentiality.
Affected Systems
Affected Microsoft products include Windows 11 versions 22H3, 23H2, 24H2, and 25H2, as well as Microsoft Windows Server 2022 23H2 (Server Core), Windows Server 2025, and Windows Server 2025 Server Core installations. These versions run on both x64 and arm64 architectures.
Risk and Exploitability
The CVSS score is 6.7, indicating medium severity, while the EPSS score is below 1%, suggesting a low probability of exploitation under current conditions. The vulnerability is not listed in the CISA KEV catalog. Attackers need local authorization to trigger the heap overflow, implying that prevention hinges on limiting local privileged access and applying the vendor patch as soon as feasible.
OpenCVE Enrichment