Impact
A heap‑based buffer overflow in the Windows kernel allows a user who already has local access to elevate privileges. This flaw arises from an uncontrolled memory write that can be triggered with crafted input, matching CWE‑122. The main impact is that the attacker can gain higher rights, potentially compromising confidentiality, integrity, or availability of the system.
Affected Systems
Microsoft Windows 10 versions 1607, 1809, 21H2, and 22H2; Windows 11 releases 23H2, 24H2, 25H2, 22H3, and 26H1; Windows Server 2012, 2012 R2, 2016, 2019, 2022, 2025, and 23H2, including Server Core installations.
Risk and Exploitability
The CVSS score of 7.8 indicates high severity. EPSS data is not available and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is local, requiring an authorized user with sufficient privileges to trigger the overflow. Successful exploitation allows the attacker to elevate privileges system‑wide, potentially leading to full system compromise.
OpenCVE Enrichment