Impact
Improper input validation in Windows Active Directory enables an attacker with authorized access to execute arbitrary code on domain controllers and potentially other machines in the same network. The flaw can compromise confidentiality, integrity, and availability of the affected systems. Based on the description, it is inferred that exploitation may allow lateral movement to other domain‑joined machines that share the same network segment.
Affected Systems
The vulnerability affects Microsoft Windows Server products ranging from 2012 R2 through 2025, including the 23H2 edition, with both full and Server Core installations impacted. These include Windows Server 2012 R2, 2016, 2019, 2022, 2025, and the 23H2 edition, each edition of these operating systems is affected.
Risk and Exploitability
The CVSS score of 8 indicates high severity. No EPSS score is available, and the issue is not listed in the CISA KEV catalog. Exploitation requires the attacker to be authenticated against Active Directory; therefore the likely attack vector is a network‑based method such as an LDAP or RPC interaction from a trusted or compromised domain account. Given the high severity and remote nature of the flaw, organizations with vulnerable domain controllers face substantial risk if adversaries gain the necessary credentials.
OpenCVE Enrichment