Impact
This vulnerability is a race condition in the Applocker filter driver (applockerfltr.sys) that enables concurrent execution of shared resources. An attacker who has local access can exploit the improper synchronization and gain elevated privileges. The flaw aligns with CWE-362 and can allow the attacker to run arbitrary code with higher rights, potentially compromising the integrity and confidentiality of the entire system.
Affected Systems
The issue affects Microsoft Windows 11 releases 23H2, 24H2, 25H2, 26H1, and 22H3, as well as Windows Server 2022 (23H2 Edition Server Core) and Windows Server 2025. Both x64 and ARM64 architectures for Windows 11 are impacted, and any installation of these releases that has not applied the Microsoft patch is vulnerable.
Risk and Exploitability
The CVSS score of 7.0 indicates high severity, with a direct risk of local privilege escalation. EPSS data is not provided, so the exploitation probability is unclear; however, the vulnerability is not listed in the CISA KEV catalog, implying no widely exploited public exploits. An authorized local attacker can execute the race condition to elevate privileges, making the risk significant for systems that remain unpatched.
OpenCVE Enrichment