Impact
A null pointer dereference in the Windows Lightweight Directory Access Protocol (LDAP) component allows an unauthorized attacker to trigger a service crash that renders the LDAP service unavailable. The flaw arises from improper handling of a null pointer and can be exploited by sending specially crafted LDAP requests.
Affected Systems
Microsoft Windows Server 2019, Windows Server 2019 Server Core, Windows Server 2022, Windows Server 2022 Server Core, Windows Server 2022 23H2, Windows Server 2025, and Windows Server 2025 Server Core installations are affected.
Risk and Exploitability
The CVSS score of 7.5 indicates high severity, but the EPSS score of less than 1% shows a low but nonzero likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation is inferred to occur remotely over the network by an unauthorized actor issuing crafted LDAP requests, which would cause the LDAP service to crash and deny availability to legitimate users.
OpenCVE Enrichment