Impact
The vulnerability is a heap-based buffer overflow in the Windows Kernel. An authorized local attacker can exploit this flaw to gain higher privileges on the affected system. The exploit does not provide arbitrary code execution explicitly within the CVE description, but the elevation of privilege can potentially allow the attacker to modify protected data or configure the system to their advantage.
Affected Systems
Microsoft Windows 11 versions 24H2, 25H2 and 26H1 as well as Microsoft Windows Server 2025, including Server Core installations, are affected. Vulnerable builds include both x64 and arm64 platforms.
Risk and Exploitability
The CVSS score of 7.8 indicates a high severity of the flaw. The EPSS score of less than 1% suggests that exploitation is considered unlikely at present. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is local, requiring the attacker to have authorized access to the target machine, such as a compromised user account or access to a privileged third‑party driver.
OpenCVE Enrichment