Impact
The Windows Ancillary Function Driver for WinSock contains a use‑after‑free flaw that can be triggered by an authorized local user. Exploitation of this bug bypasses the intended authority boundaries and can grant SYSTEM‑level access. The weakness is a classic use‑after‑free vulnerability (CWE‑416) that undermines memory safety within the driver and allows the attacker to execute arbitrary code with elevated privileges.
Affected Systems
Affected installations include Microsoft Windows 10 editions from version 1607 through 22H2, Windows 11 releases 23H2, 24H2, 25H2, 22H3, and 26H1, and the Windows Server line from 2012 through 2025 as well as the 23H2 edition. All of these systems run the AFD component for WinSock and therefore are susceptible to the privilege‑escalation condition described.
Risk and Exploitability
The CVSS score of 7.0 indicates a high impact severity, while the EPSS is currently unavailable and the vulnerability is not listed in CISA's KEV catalog, suggesting that there has been no confirmed exploitation yet. An attacker would need local access and sufficient privileges to invoke WinSock functions that exercise the freed memory region; once achieved, the compromised process could acquire SYSTEM rights. Because this is a local privilege‑escalation scenario, the practical risk depends on the attacker’s initial foothold, but the ability to reach full control of the host makes it a high‑priority issue for internal security teams.
OpenCVE Enrichment