Impact
A race condition in the Windows Shell allows an authorized user to perform concurrent operations on a shared resource without proper synchronization. Exploiting this flaw can elevate the user’s privileges locally, granting higher access levels within the same system.
Affected Systems
The vulnerability affects Microsoft Windows 10 versions 1809, 21H2, and 22H2; Windows 11 releases 22H3, 23H2, 24H2, 25H2, and 26H1; and Windows Server 2019, Windows Server 2019 Server Core, Windows Server 2022, the Windows Server 2022 23H2 Edition Server Core, Windows Server 2025, and Windows Server 2025 Server Core installations.
Risk and Exploitability
Assigned a CVSS v3.1 score of 7.8, the flaw carries a high severity rating. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog. The most probable attack vector is a local, authenticated attacker who can repeatedly invoke the Windows Shell to trigger the race condition. Given the high impact and lack of public exploitation evidence, systems should apply remediation promptly.
OpenCVE Enrichment