Impact
The vulnerability arises from a double free bug in the Windows Message Queuing (MSMQ) component, a flaw under CWE‑415 that allows an authorized user to corrupt memory and bypass privilege checks, thereby enabling local privilege escalation. Because MSMQ runs with system-level privileges, exploitation can grant the attacker full control over the affected machine.
Affected Systems
Microsoft Windows client and server editions are impacted. This includes Windows 10 build 1607, 1809, 21H2, and 22H2; Windows 11 builds 23H2, 24H2, 25H2, 26H1, and 22H3; and Windows Server releases 2012, 2012 R2, 2016, 2016 (Server Core installation), 2019, 2019 (Server Core installation), 2022, 23H2 Edition (Server Core installation), 2025, and 2025 (Server Core installation).
Risk and Exploitability
The CVSS score of 7.8 denotes a high-risk vulnerability. With no EPSS value available, the likelihood of exploitation is uncertain, but the flaw is not listed in CISA’s KEV catalog. The attack requires local, authorized access, and an attacker who can act with the MSMQ service can use the double‑free defect to gain SYSTEM privileges, allowing arbitrary code execution and total control over the operating system.
OpenCVE Enrichment