Impact
An Active Directory Domain Services flaw permits an attacker with authorized access to bypass name restrictions for files and other resources, enabling them to gain elevated privileges on the domain. This could allow the attacker to assume higher roles such as administrator, access sensitive data, modify policies, or spread malicious actions throughout the network.
Affected Systems
Microsoft Windows 10 versions 1607, 1809, 21H2, and 22H2, Windows 11 releases 23H2, 24H2, 25H2, 22H3, and 26H1, and Microsoft Windows Server editions 2012, 2012 R2, 2016, 2019, 2022, and 2025 are all affected. Domain controllers, member servers, and client machines running any of these versions are vulnerable. The vulnerability applies to both system and user accounts with domain privileges.
Risk and Exploitability
The CVSS base score of 8.8 signifies high severity, but the EPSS score of less than 1% suggests low current exploitation probability. The issue is not listed in CISA’s KEV catalog, implying no publicly disclosed active exploitation. Likely, exploitation requires a compromised account with sufficient privileges in the domain and the ability to manipulate AD objects over the network.
OpenCVE Enrichment