Impact
A use‑after‑free bug in the Windows Print Spooler components allows an attacker who already has local access to exploit the spooler and gain higher privileges. The vulnerability falls under CWE‑416 and can potentially lead to the execution of arbitrary code with elevated rights, compromising system integrity and allowing the attacker to bypass security controls.
Affected Systems
Affected systems are Microsoft Windows 11 versions 24H2, 25H2, and 26H1, as well as Windows Server 2022 (23H2 edition) and Windows Server 2025, including Server Core installations. These operating systems contain the vulnerable Print Spooler service that developers have identified in the recent security advisory.
Risk and Exploitability
The CVSS score of 7.8 indicates a high severity local privilege escalation. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog, suggesting no known active exploits in the wild yet. Attack requires a local user with the ability to submit malicious print jobs or otherwise interact with the spooler, making it a local abuse scenario rather than a network‑based vector.
OpenCVE Enrichment