Impact
A flaw in the Windows Kernel causes sensitive data to be written to a log file. If an attacker can read these logs, they can obtain confidential information that was not intended to be exposed. The vulnerability is a form of log file exposure, and its primary impact is the disclosure of sensitive information to a local adversary.
Affected Systems
Microsoft Windows 10 versions 1607, 1809, 21H2, 22H2; Windows 11 versions 23H2, 24H2, 25H2, 22H3, 26H1; and Windows Server editions 2012, 2016, 2019, 2022, 2025, and 23H2 Edition. Affected architectures include x86, x64, and arm64 builds.
Risk and Exploitability
The CVSS score is 5.5, indicating a moderate severity. EPSS score is not available, so the probability of exploitation cannot be quantified. The vulnerability is not listed in the CISA KEV catalog, suggesting no known large‑scale exploitation. The likely attack vector is a local attacker with sufficient privileges to read kernel log files; this is inferred from the description. The flaw leads only to information disclosure, not direct code execution or privilege escalation, but it could aid attackers in reconnaissance.
OpenCVE Enrichment