Impact
The vulnerability is a race condition in the Windows SSDP Service that allows a local attacker who has authorized access to execute code with elevated privileges. Because the service does not properly synchronize concurrent operations on a shared resource, an attacker can trigger a timing attack to alter privilege escalation paths. The attack can result in the attacker gaining administrative rights on the affected machine, potentially enabling full system compromise.
Affected Systems
Affected systems include multiple Windows client and server editions. Microsoft Windows 10 – versions 1607 through 22H2, Windows 11 – versions 22H3, 23H2, 24H2, 25H2, 26H1, and all supported Windows Server releases from Server 2012 through Server 2025. The risk applies to both standard and Server Core installations. No specific sub-version constraints are listed beyond the major editions enumerated.
Risk and Exploitability
The CVSS base score is 7 (High), indicating a strong severity, but the EPSS score is not available, so the current probability of exploitation is unknown. The vulnerability is not listed in CISA’s Known Exploited Vulnerabilities catalog. The likely attack vector is local; an attacker with user-level access can trigger the race condition by sending crafted SSDP requests, which may require privilege escalation scripts or specialized tools. The exploit path depends on the attacker’s ability to send concurrent requests to the SSDP service while ensuring the race condition occurs.
OpenCVE Enrichment