CVSS VectorNVD
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
Lifecycle Timeline
1DescriptionNVD
Use after free in Windows User Interface Core allows an authorized attacker to elevate privileges locally.
AnalysisAI
Local privilege escalation in Windows User Interface Core across Windows 10, 11, and Server 2019-2025 allows low-privileged authenticated attackers to achieve SYSTEM-level access via use-after-free memory corruption. The vulnerability requires high attack complexity and local access but enables container escape (scope change) with full confidentiality, integrity, and availability impact. …
Sign in for full analysis, threat intelligence, and remediation guidance.
RemediationAI
Within 24 hours: Identify all Windows 10, 11, and Server 2019-2025 systems in production, particularly those running containerized workloads or hosting multi-tenant applications. Within 7 days: Apply vendor-released patches to all affected systems, prioritizing containers and virtualized environments first. …
Sign in for detailed remediation steps.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2026-22557
GHSA-p8vg-rv38-2jxx