Impact
The vulnerability is a use‑after‑free bug in the Windows Ancillary Function Driver for WinSock. An authorized local attacker can trigger the flaw to elevate her or his privileges, effectively reaching the rights of a higher privileged account and taking control of the system. This aligns with the CWE‑416 categorization of Use After Free.
Affected Systems
Affected systems include Microsoft Windows 10 from version 1607 through 22H2, Windows 11 from version 22H3 to 26H1, and Windows Server releases 2012 through 2025, including both full and Server Core installations. These versions are listed by Microsoft as impacted by the flaw.
Risk and Exploitability
The CVSS score of 7 indicates high severity, while the EPSS score is not available and the vulnerability is not currently listed in the CISA KEV catalog. The description states that an authorized local attacker can exploit the flaw, implying that a user with some level of local access is required. The lack of a known public exploit and absence from KEV reduces current exploitability risk, but the severity warrants prompt attention if a patch is not yet applied.
OpenCVE Enrichment