Impact
A use‑after‑free flaw in Windows Shell can be exploited by an authorized user to gain elevated privileges. The flaw occurs when the shell frees memory in an incorrect order, leaving a dangling pointer that can be leveraged to execute code with higher rights. As a result, an attacker could step from a limited user context to an elevated or administrator level, compromising system integrity. The vulnerability is mapped to CWE‑416.
Affected Systems
Microsoft Windows 11 releases 22H3, 23H2, 24H2, 25H2, 26H1 and Microsoft Windows Server 2022 (including the Server Core 23H2 edition) and Windows Server 2025 are affected. All listed builds are vulnerable; the issue is present in the shell component of these operating systems.
Risk and Exploitability
The CVSS score of 7 indicates high severity, and the EPSS score is not available, so the exact execution probability is unknown. The vulnerability is not listed in CISA’s KEV catalog, but the local‑attack requirement and the possibility of privilege escalation make it a serious risk. An attacker who can run code in a normal user session could exploit the use‑after‑free to gain administrative rights, potentially impacting confidentiality, integrity, and availability of the machine. The attack vector is local and would require that the victim be logged on or have a user‑level application interface to the shell.
OpenCVE Enrichment