Impact
An improper access control bug in Windows Virtualization‑Based Security (VBS) enclaves lets an attacker who already has authorized local access bypass a security feature. The flaw can allow the attacker to elevate privileges or compromise host integrity by exploiting the enclave’s weakened controls.
Affected Systems
Microsoft Windows 11 24H2, 25H2, and 26H1 – including the ARM64 build – and Microsoft Windows Server 2025, which also includes Server Core installations.
Risk and Exploitability
The CVSS score of 4.4 indicates a low‑to‑medium severity assessment. No EPSS value is available, and the vulnerability is not listed in CISA’s KEV catalog. Exploitation requires local, authorized access; no remote attack vector is documented in the supplied information.
OpenCVE Enrichment