Impact
A race condition in the Windows TCP/IP stack occurs when multiple processes access a shared resource without proper synchronization. This flaw allows a local attacker who has authorized access to the system to elevate their privileges, potentially gaining administrative rights. The vulnerability is classified as CWE-362, indicating improper handling of concurrent execution.
Affected Systems
Affected operating systems include Microsoft Windows 10 versions 1607, 1809, 21H2, and 22H2, Windows 11 versions 23H2, 24H2, 25H2, 22H3, and 26H1, as well as Windows Server releases 2012, 2012 R2, 2016, 2019, 2022, and 2025 (including their core and 23H2 editions).
Risk and Exploitability
The CVSS score of 7.8 places this flaw in the medium-to-high severity range, and the lack of an EPSS score indicates no publicly available data on exploitation frequency. Because the vulnerability requires local, authorized access, it is deemed a moderate risk until a patch is applied. The flaw is not catalogued in the CISA KEV list, suggesting no known widespread exploitation, but its potential to grant administrative privileges warrants prompt action.
OpenCVE Enrichment