Impact
An use‑after‑free flaw in the Desktop Window Manager component permits an attacker with local or authorized access to corrupt memory and gain elevated privileges. The vulnerability enables the execution of arbitrary code under the context of a higher‑privileged account, potentially compromising confidentiality, integrity, and availability on the affected machine. The weakness corresponds to an unsafe handling of freed memory resources.
Affected Systems
Systems affected include Windows 10 version 21H2 and 22H2, Windows 11 version 23H2 and 22H3, and Windows Server 2022 and the 23H2 Edition running Server Core. The issue exists on x86, x64, and ARM64 architectures as indicated by the affected CPE entries. Administrators should verify whether these operating system builds are present in their environment.
Risk and Exploitability
The severity rating is CVSS 7.8, indicating a moderate to high impact. Exploitability is not quantified by an EPSS score and the vulnerability is not listed in the KEV catalog, suggesting it has not yet seen widespread exploitation. The attack requires local, authorized access and relies on an earlier use‑after‑free condition, meaning a typical attacker must first obtain some local foothold. Once the memory corruption occurs, privilege escalation is possible within the same session.
OpenCVE Enrichment