Description
Use after free in Windows Projected File System allows an authorized attacker to elevate privileges locally.
Published: 2026-05-12
Score: 7 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability is a use‑after‑free flaw in the Windows Projected File System component. The defect enables an authorized attacker to execute a crafted sequence of file‑system operations that affects kernel memory, thereby allowing the attacker to increase the privileges they hold on the local machine. The primary impact is a local privilege escalation, where a user who can run code on the affected system can gain higher privileges than intended.

Affected Systems

Affected versions include Microsoft Windows 10 (1809, 21H2, 22H2), Windows 11 (22H3, 23H2, 24H2, 25H2, 26H1), and Microsoft Windows Server 2019, 2022, 2025, including their Server Core installations. All supported architectures are impacted.

Risk and Exploitability

The CVSS score of 7.0 reflects moderate to high severity. EPSS information is not available, so the likelihood of exploitation in the wild cannot be determined from the public data. The vulnerability is not listed in the CISA KEV catalog, indicating no reported active exploitation. However, the flaw can only be triggered by an attacker who already has local access or authorized user privileges on the system.

Generated by OpenCVE AI on May 12, 2026 at 19:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the security update for CVE‑2026‑34340 from Microsoft’s official advisory at https://msrc.microsoft.com/update-guide/vulnerability/CVE‑2026‑34340
  • After updating, reboot the system to ensure all driver components are reloaded with the corrected code
  • Review local user account policies to limit the number of users with administrative privileges, reducing the attack surface for local privilege escalation

Generated by OpenCVE AI on May 12, 2026 at 19:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 17:30:00 +0000

Type Values Removed Values Added
Description Use after free in Windows Projected File System allows an authorized attacker to elevate privileges locally.
Title Windows Projected File System Elevation of Privilege Vulnerability
First Time appeared Microsoft
Microsoft windows 10 1809
Microsoft windows 10 21h2
Microsoft windows 10 22h2
Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 26h1
Microsoft windows 11 2h2
Microsoft windows Server 2019
Microsoft windows Server 2022
Microsoft windows Server 2025
Microsoft windows Server 23h2
Weaknesses CWE-416
CPEs cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_26H1:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_2H2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft windows 10 1809
Microsoft windows 10 21h2
Microsoft windows 10 22h2
Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 26h1
Microsoft windows 11 2h2
Microsoft windows Server 2019
Microsoft windows Server 2022
Microsoft windows Server 2025
Microsoft windows Server 23h2
References
Metrics cvssV3_1

{'score': 7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Windows 10 1809 Windows 10 21h2 Windows 10 22h2 Windows 11 23h2 Windows 11 24h2 Windows 11 26h1 Windows 11 2h2 Windows Server 2019 Windows Server 2022 Windows Server 2025 Windows Server 23h2
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-05-12T17:54:14.498Z

Reserved: 2026-03-26T21:02:16.446Z

Link: CVE-2026-34340

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-12T18:17:08.303

Modified: 2026-05-12T18:17:08.303

Link: CVE-2026-34340

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T19:30:23Z

Weaknesses