Impact
An untrusted pointer dereference exists in the Win32K subsystem when handling ICOMP data, allowing a locally authenticated user to execute code with higher privilege. The flaw is identified as a pointer integrity issue that can lead to user‑level escalation of authority. The impact is the ability to run code with privileges that exceed those of the attacking account, potentially enabling administrative actions on the host.
Affected Systems
Microsoft Windows 11 versions 24H2, 25H2, and 26H1, as well as Microsoft Windows Server 2025 (including Server Core installations) are impacted by this vulnerability.
Risk and Exploitability
The CVSS base score of 7.8 indicates a high potential impact; specific EPSS data is not available and the issue is not listed in the CISA KEV catalog. Exploitation requires the attacker to have local access to the machine and to be authorized to run applications. If the vulnerability is successfully triggered, the attacker can execute code at the user level, which may allow escalation to administrator privileges on that system.
OpenCVE Enrichment