Impact
A race condition exists in the Windows Print Spooler components that allows a local user who already has authorized access to execute concurrent operations on a shared resource without proper synchronization. This issue can be exploited by such an attacker to gain higher privileges on the host machine. The weakness is identified as CWE-362, indicating an improper handling of concurrent threads that leads to privilege escalation. The impact flows from unauthorized elevation to full system control, enabling the attacker to compromise confidentiality, integrity, and availability of the affected system.
Affected Systems
Microsoft Windows operating systems including Windows 10 (from version 1607 through 22H2), Windows 11 (all branches such as 23H2, 24H2, 25H2, 26H1 and older releases like 22H3), and Windows Server editions from 2012 up to 2025 plus the Server 23H2 release. All described Server Core installations are also affected.
Risk and Exploitability
The vulnerability carries a CVSS score of 7, reflecting a high severity for local privilege escalation. The EPSS score is not available, so the exact exploitation probability cannot be quantified, but the lack of KEV listing does not diminish the potential risk in environments where local attackers exist. The likely attack vector requires an authorized local user who can execute code that triggers concurrent access to the Print Spooler service. Upon successful exploitation, the attacker can elevate privileges to SYSTEM level, enabling full control over the affected machine.
OpenCVE Enrichment