Impact
This vulnerability is a use‑after‑free in the Windows Win32K graphics subsystem (CWE‑416). An authorized local user can manipulate freed memory, enabling elevation of privileges locally. The effect is an increase in the privileges of the attacking process within the local system scope. No other consequences are stated in the supplied description.
Affected Systems
Affected products include Microsoft Office for Android and multiple Windows operating systems: Windows 10 versions 1607, 1809, 21H2, 22H2; Windows 11 versions 23H2, 24H2, 25H2, 22H3; Windows Server 2012, 2012 R2, 2016, 2019, 2022, 2025, including Server Core installations. The CNA data lists these versions but does not give a precise patch level or update requirement beyond the reference to the Microsoft security update page.
Risk and Exploitability
The CVSS score of 7 indicates moderate severity. The EPSS score is reported as less than 1 %, reflecting a low probability of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires the attacker to be a local, authorized user capable of triggering the use‑after‑free in Win32K; no public exploits are noted in the supplied information.
OpenCVE Enrichment