Impact
The vulnerability is a race condition in the Windows Ancillary Function Driver for WinSock that allows an authorized user to elevate their privileges on the local system. This flaw is caused by concurrent access to a shared resource without proper synchronization. The CNA identifies the weakness as CWE‑362 (Race Condition) and additionally lists it under CWE‑416 (Use‑After‑Free) without further detail on memory misuse.
Affected Systems
Affected operating systems include Microsoft Windows 10 versions 1607, 1809, 21H2, and 22H2; Windows 11 versions 23H2, 24H2, 25H2, 26H1, and 22H3; and Windows Server versions 2016, 2019, 2022, 2025, and the 23H2 edition. The Server Core installations for Windows Server 2016, 2019, 2022, 2025, and 23H2 are also impacted.
Risk and Exploitability
The CVSS score of 7 indicates a high‑severity local privilege escalation. EPSS is not available, so no quantitative exploitation probability is reported, and the vulnerability is not listed in CISA’s KEV catalog. The attack requires local user access and does not rely on network or remote execution vectors.
OpenCVE Enrichment