Impact
This vulnerability is a race condition in the Windows Cloud Files Mini Filter Driver. Concurrent execution using a shared resource without proper synchronization allows an authorized user to gain elevated local privileges. The weakness involves improper handling of shared data and results in a potential use of privileges beyond those the user originally possesses. The excerpt identifies the flaw as CWE‑362 (Concurrent Modification of Shared Data) and CWE‑416 (Use After Free).
Affected Systems
Affected builds include Windows 10 from version 1809 through 22H2, Windows 11 versions 22H3 to 26H1 and 23H2, as well as Windows Server 2019, 2022, 2025, and the 23H2 Server Core edition. The impact spans x86, x64, and arm64 architectures as listed in the CPE information, covering a wide range of enterprise and server environments.
Risk and Exploitability
The CVSS score of 7.0 indicates moderate‑to‑high severity. EPSS data is not available and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires local presence or compromised credentials; it cannot be triggered remotely over the network. Insider threats or credential compromise pose a significant risk to organizations that rely on these Windows versions.
OpenCVE Enrichment