Impact
A use‑after‑free flaw in the Windows kernel allows an attacker who already has local system access to execute code with higher privileges, potentially reaching SYSTEM level. The vulnerability arises when kernel objects are freed and later accessed, enabling the attacker to overwrite critical memory structures. As a result, the attacker can manipulate kernel operations, compromise data integrity, and potentially take full control of the affected machine.
Affected Systems
Microsoft Windows 10 versions 21H2 and 22H2, Windows 11 releases from 23H2 through 26H1, Windows Server 2022 (including the 23H2 Edition Server Core), and Windows Server 2025 (both full and Server Core installations) are impacted. Compatibility is noted for x86, arm64, and x64 architectures.
Risk and Exploitability
The vulnerability receives a CVSS score of 7.8, signifying high severity. EPSS indicates a low probability of exploitation (<1%). The flaw is not listed in the CISA KEV catalog. Exploitation requires a local attacker with sufficient privileges to trigger the use‑after‑free in the kernel. Once active, the attacker can elevate privileges to SYSTEM, granting unrestricted control over the host.
OpenCVE Enrichment