Impact
Authorized network users can trigger a race condition in the Windows SMB Server, allowing them to gain elevated privileges on the host. The flaw is a classic improper synchronization issue (race condition) that, when exploited, bypasses authentication checks and grants the attacker higher level permissions. This can lead to execution of arbitrary code or full system compromise, depending on the privileges the attacker elevates to.
Affected Systems
Microsoft Windows 10 releases starting with version 1607, including 1809, 21H2, 22H2, Windows 11 editions 23H2, 24H2, 25H2, and 22H3, as well as Windows Server 2008 R2 SP1, Windows Server 2008 SP2, Windows Server 2012, 2012 R2, 2016, 2019, 2022, 2025 and their corresponding Server Core installations.
Risk and Exploitability
The CVSS score of 7.5 indicates a high severity, but the EPSS score is very low (< 1%), suggesting that exploitation is currently unlikely. The vulnerability is not listed in the CISA KEV catalog. The attack vector is inferred to be via the SMB service over the network, requiring an attacker to be already authenticated or have authorized access to the SMB share. If successfully exploited, the attacker could achieve a privilege escalation that compromises the confidentiality, integrity, and availability of the host and potentially the entire network.
OpenCVE Enrichment