Impact
Improper resolution of symbolic links by the Host Process for Windows Tasks allows an attacker who already has local rights to gain elevated privileges. Because the process fails to validate link targets before access, a crafted link can point to privileged system files, enabling the attacker to write or execute code with higher authority. The vulnerability is classified as CWE‑59, indicating a flaw in indirect file reference handling.
Affected Systems
Microsoft Windows 11 Version 24H2, Microsoft Windows 11 Version 25H2, Microsoft Windows Server 2025, and Microsoft Windows Server 2025 (Server Core) are affected, covering all standard x64 and ARM64 builds specified by the CNA.
Risk and Exploitability
The CVSS base score of 7.8 reflects moderate to high severity, but the EPSS is less than 1% and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, indicating a low likelihood of widespread exploitation. The attack requires local authorization and the ability to create or manipulate symbolic links; it does not provide a remote entry point. If an attacker can craft a link and execute the host process with elevated privileges, they could bypass restricted access controls and execute arbitrary code.
OpenCVE Enrichment