- Windows 10 version 1809 from 10.0.17763.0 before 10.0.17763.8027
- Windows 10 version 21H2 from 10.0.19044.0 before 10.0.19044.6575
- Windows 10 version 22H2 from 10.0.19045.0 before 10.0.19045.6575
- Windows 11 version 25H2 from 10.0.26200.0 before 10.0.26200.7171
- Windows 11 version 22H3 from 10.0.22631.0 before 10.0.22631.6199
- Windows 11 version 23H2 from 10.0.22631.0 before 10.0.22631.6199
- Windows 11 version 24H2 from 10.0.26100.0 before 10.0.26100.7171
- Windows server 2019 versions from 10.0.17763.0 before 10.0.17763.8027
- Windows server 2019 (Server Core installation) versions from 10.0.17763.0 before 10.0.17763.8027
- Windows server 2022 versions from 10.0.20348.0 before 10.0.20348.4405
- Windows server 2025 versions from 10.0.26100.0 before 10.0.26100.7171
- Windows server 2025 (Server Core installation) versions from 10.0.26100.0 before 10.0.26100.7171
- Windows Server 2022, 23H2 (Server Core installation) versions from 10.0.25398.0 before 10.0.25398.1965
Note: Organizations should verify exact build numbers via the Microsoft advisory, as build-numbers and superseded updates may vary by channel (e.g., LTSC, ESU, Server Core).
A vulnerability has been reported in Microsoft windows kernel, which could allow an authorized attacker to elevate privileges locally on the targeted system.
Target Audience:
All end-user organizations and individuals using Microsoft windows operating systems.
Risk Assessment:
High risk of data manipulation and service disruption.
Impact Assessment:
Potential impact on confidentiality, integrity, and availability of the system.
The information provided herein is on "as is" basis, without warranty of any kind.