Description
Concurrent execution using shared resource with improper synchronization ('race condition') in Applocker Filter Driver (applockerfltr.sys) allows an authorized attacker to elevate privileges locally.
Published: 2026-04-14
Score: 7 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

This vulnerability is a race condition in the Applocker filter driver (applockerfltr.sys) that enables concurrent execution of shared resources. An attacker who has local access can exploit the improper synchronization and gain elevated privileges. The flaw aligns with CWE-362 and can allow the attacker to run arbitrary code with higher rights, potentially compromising the integrity and confidentiality of the entire system.

Affected Systems

The issue affects Microsoft Windows 11 releases 23H2, 24H2, 25H2, 26H1, and 22H3, as well as Windows Server 2022 (23H2 Edition Server Core) and Windows Server 2025. Both x64 and ARM64 architectures for Windows 11 are impacted, and any installation of these releases that has not applied the Microsoft patch is vulnerable.

Risk and Exploitability

The CVSS score of 7.0 indicates high severity, with a direct risk of local privilege escalation. EPSS data is not provided, so the exploitation probability is unclear; however, the vulnerability is not listed in the CISA KEV catalog, implying no widely exploited public exploits. An authorized local attacker can execute the race condition to elevate privileges, making the risk significant for systems that remain unpatched.

Generated by OpenCVE AI on April 14, 2026 at 18:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the Microsoft security update for CVE-2026-25184 via Windows Update or the Microsoft update guide.
  • If the update cannot be applied immediately, isolate or lock down the affected systems to prevent local attackers from exploiting the driver.
  • Verify that the patch has been installed by checking the system update history or the Windows Security Center.

Generated by OpenCVE AI on April 14, 2026 at 18:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft windows 11 22h3
Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows 11 26h1
Microsoft windows Server 2022, 23h2 Edition (server Core Installation)
Microsoft windows Server 2025 (server Core Installation)
Vendors & Products Microsoft windows 11 22h3
Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows 11 26h1
Microsoft windows Server 2022, 23h2 Edition (server Core Installation)
Microsoft windows Server 2025 (server Core Installation)

Tue, 14 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 17:30:00 +0000

Type Values Removed Values Added
Description Concurrent execution using shared resource with improper synchronization ('race condition') in Applocker Filter Driver (applockerfltr.sys) allows an authorized attacker to elevate privileges locally.
Title Applocker Filter Driver (applockerfltr.sys) Elevation of Privilege Vulnerability
First Time appeared Microsoft
Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows 11 26h1
Microsoft windows Server 2025
Microsoft windows Server 23h2
Weaknesses CWE-362
CPEs cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_25H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_26H1:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows 11 26h1
Microsoft windows Server 2025
Microsoft windows Server 23h2
References
Metrics cvssV3_1

{'score': 7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Windows 11 22h3 Windows 11 23h2 Windows 11 23h2 Windows 11 24h2 Windows 11 24h2 Windows 11 25h2 Windows 11 25h2 Windows 11 26h1 Windows 11 26h1 Windows Server 2022, 23h2 Edition (server Core Installation) Windows Server 2025 Windows Server 2025 (server Core Installation) Windows Server 23h2
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-15T21:53:56.083Z

Reserved: 2026-01-29T18:36:49.696Z

Link: CVE-2026-25184

cve-icon Vulnrichment

Updated: 2026-04-14T19:38:55.474Z

cve-icon NVD

Status : Received

Published: 2026-04-14T18:16:45.390

Modified: 2026-04-14T18:16:45.390

Link: CVE-2026-25184

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T21:02:55Z

Weaknesses