Impact
The vulnerability arises from a race condition in the Windows Win32K graphical subsystem, specifically the GRFX component. Concurrent processes accessing shared resources lack proper synchronization, enabling an attacker who can execute code locally to exploit the flaw. The result is a local privilege escalation that permits the attacker to gain elevated privileges that can compromise system security.
Affected Systems
Affected are Microsoft Windows clients and servers built on Windows 10 versions 1809 through 22H2, Windows 11 versions 23H2 through 26H1, and Windows Server 2019, 2022, 2025, and 23H2 editions. The vulnerability applies across multiple CPU architectures including x86, x64, and ARM64. All listed versions are impacted; there is no publicly available version information that resolves the issue.
Risk and Exploitability
The CVSS score of 7 indicates a high severity. EPSS is not available, and the vulnerability is not listed in CISA KEV, so the probability of exploitation is not quantified. However, because the flaw requires local authorized access and improper synchronization, an attacker who has the ability to execute code on the host can trigger the race condition. The attack vector is inferred to be a local privilege escalation that leverages a race condition on the Win32K GRFX module.
OpenCVE Enrichment