Impact
An untrusted pointer dereference in the Windows kernel permits an attacker who already has local access to gain elevated privileges. Classified as CWE‑822, the flaw allows local execution of code with higher authority, effectively compromising the integrity of the affected system. The attack requires the attacker to be authorized and able to run code locally, but does not require network access.
Affected Systems
Microsoft Windows 11 version 24H2, Windows 11 version 25H2, Windows 11 version 26H1, Windows Server 2025, and Windows Server 2025 (Server Core installation) are all affected. The vulnerability exists on the 64‑bit editions of these operating systems and can be triggered by any process with local execution rights.
Risk and Exploitability
The CVSS score of 7.8 indicates high severity, although the EPSS score is not available, making the exploitation probability unclear. The vulnerability is not listed in the CISA KEV catalogue, suggesting no widely known exploits are public. The likely attack vector is local privilege escalation, requiring an authorized user to run arbitrary code on the host. Once exploited, the attacker can obtain kernel‑level privileges, disabling security mechanisms and modifying system configurations.
OpenCVE Enrichment