Impact
A failure in the Windows Shell protection mechanism allows an attacker to bypass a security feature when interacting over a network. This bypass can be used to execute commands or compromise the integrity of the target system, representing a serious risk of unauthorized code execution, as indicated by the CWE-693 weakness.
Affected Systems
The vulnerability affects Microsoft Windows 10 versions 1607, 1809, 21H2, and 22H2; Windows 11 versions 23H2, 24H2, 25H2, 22H3, and 26H1; and Windows Server 2012, 2012 R2, 2016, 2019, 2022, 2025, and 23H2 editions, including both full and core installations.
Risk and Exploitability
With a CVSS score of 8.8 the exploit is considered high severity. Although EPSS data is not available, the lack of listing in the CISA KEV catalog does not diminish the attack potential. The likely attack vector involves remote exploitation of the Windows Shell component over a network, requiring no local privileges and potentially enabling arbitrary code execution or elevation of privileges on the affected systems.
OpenCVE Enrichment