Impact
A use‑after‑free flaw in the Windows TCP/IP stack can be triggered by a crafted network packet. The vulnerability permits an unauthorized attacker to execute arbitrary code on the affected system, potentially giving full control over the machine. The weakness is classified as CWE‑416, and its CVSS score of 8.1 indicates high severity for confidentiality, integrity, and availability.
Affected Systems
Microsoft Windows 10 (builds 1809, 21H2, 22H2), Windows 11 (builds 22H3, 23H2, 24H2, 25H2, 26H1) and Windows Server 2019, 2022, 2025, 23H2 edition are impacted. The application layer may be on x86, x64 or arm64 platforms, depending on the specific release, as listed in the CPE data.
Risk and Exploitability
The patch is not listed in the CISA KEV catalog and, as of the current data, no EPSS score is available. The CVSS score of 8.1 reflects the high risk and indicates that the flaw is exploitable remotely over TCP/IP without authentication. Attackers can send malicious packets over the network to trigger the use‑after‑free, which could lead to complete system takeover. Regular monitoring for suspicious inbound traffic and applying the vendor patch are recommended to reduce exposure.
OpenCVE Enrichment