Impact
The vulnerability permits the kernel to write sensitive information into its log files when an attacker has sufficient privileges, allowing that data to be read locally. This flaw corresponds to CWE‑532, Information Exposure Through Log Files, and results in confidential information leakage from the kernel's logging mechanism.
Affected Systems
Affected systems include Microsoft Windows 10 Version 21H2, Windows 10 Version 22H2, Windows 11 Version 23H2, Windows 11 Version 24H2, Windows 11 Version 25H2, Windows 11 version 22H3, Windows 11 version 26H1, Windows Server 2022, Windows Server 2022, 23H2 Edition (Server Core installation), Windows Server 2025, and Windows Server 2025 (Server Core installation).
Risk and Exploitability
The CVSS base score of 5.5 indicates moderate severity.SS information is not available and the vulnerability is not listed in the CISA KEV catalog. The attack vector is local, inferred from the requirement that the attacker is an authorized user who can influence the kernel’s logging process. Exploitation requires the ability to insert sensitive information into log files; an attacker with local privileged access can achieve this. No public exploit has been disclosed, and the impact is limited to partial disclosure of data stored in kernel logs, potentially compromising confidentiality of system operation details.
OpenCVE Enrichment