Impact
A heap-based buffer overflow in the Windows Common Log File System Driver can be triggered by an authorized user, allowing local privilege escalation. The flaw may let an attacker write arbitrary data to memory, potentially leading to the execution of malicious code with elevated rights. The weakness is categorized as a classic heap overflow (CWE‑122) and can compromise the confidentiality, integrity, or availability of the affected system if exploited.
Affected Systems
Affected products include all Microsoft Windows 10 releases from version 1607 through 22H2, all Windows 11 releases from 22H3 through 26H1, as well as Windows Server editions 2012, 2012 R2, 2016, 2019, 2022, 2025, and the 23H2 edition. Any system hosting the Common Log File System Driver and falling within these build windows is susceptible.
Risk and Exploitability
The CVSS score of 7.8 indicates a high severity for local attack. EPSS data is not available, so the current probability of exploitation is uncertain. The vulnerability is not listed in the CISA KEV catalog, suggesting no widespread exploitation reports. The likely attack vector is local, requiring an authorized user or compromised local process to trigger the overflow in the driver.
OpenCVE Enrichment