Impact
A null pointer dereference in the Windows Ancillary Function Driver for WinSock allows an authorized local user to gain elevated privileges, enabling the execution of code with higher rights, installation of malicious software, alteration of system settings, or other compromise of the machine; the weakness corresponds to CWE‑476.
Affected Systems
The flaw affects Microsoft Windows 10 releases 21H2 and 22H2, Windows 11 releases 22H3, 23H2, 24H2, 25H2 and 26H1, as well as Microsoft Windows Server 2022 (including the 23H2 edition and Server Core installation) and Windows Server 2025 (including the Server Core installation), across all supported processor architectures—x86, x64, and arm64.
Risk and Exploitability
The CVSS score of 7.8 places the flaw in the high severity range, yet the EPSS score of less than 1 % indicates it is currently unlikely to be widely exploited; it is not listed in the CISA KEV catalog. Attackers must first obtain local authentication or run an application with user privileges; once the null pointer fault in the driver is triggered, they can obtain elevated privileges and potentially take full control of the system.
OpenCVE Enrichment