Impact
Improper input validation within Microsoft PowerShell enables an authorized local user to execute commands with elevated privileges, effectively promoting their access level to that of the system or administrator. This weakness, classified as CWE‑20, allows the attacker to run arbitrary code at a higher security level, potentially compromising confidentiality, integrity, or availability of the affected system.
Affected Systems
Affected systems include Microsoft Windows 10 versions 1607, 1809, 21H2, and 22H2; Windows 11 versions 23H2, 24H2, 25H2, 26H1, and 22H3; and Microsoft Windows Server editions 2016, 2019, 2022, 2025, and 23H2 (server core installations).
Risk and Exploitability
The CVSS score of 7.8 indicates a high severity risk. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog, suggesting no widespread exploitation yet. The attack vector is inferred to be local; an attacker with legitimate user rights can trigger the exploitation by providing crafted input to PowerShell, thereby elevating their privileges on the host system.
OpenCVE Enrichment