Impact
A heap-based buffer overflow exists in the Windows USB Print Driver (usbprint.sys). When a malicious USB peripheral is attached, an unauthorized user can trigger the overflow and gain elevated privileges on the local system. The flaw is classified as CWE‑122, indicating a memory corruption vulnerability that can lead to privilege escalation.
Affected Systems
The issue affects Microsoft Windows 11 versions 24H2, 25H2, and 26H1, as well as Microsoft Windows Server 2025 and its Server Core installation. No other operating systems or vendors are listed.
Risk and Exploitability
The CVSS score of 6.8 reflects a moderate severity. The vulnerability requires a physical presence or control over the USB device to trigger the overflow, making remote exploitation unlikely. Because the flaw leads to privilege escalation, an attacker with local access to the victim’s machine could gain higher privileges once the malicious USB device is plugged in. No EPSS score or KEV listing is available, so the risk is currently considered moderate with a low probability of widespread exploitation given the physical attack vector.
OpenCVE Enrichment