CVSS VectorNVD
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
1DescriptionNVD
Heap-based buffer overflow in Microsoft Graphics Component allows an unauthorized attacker to execute code locally.
AnalysisAI
Local privilege escalation in Microsoft Graphics Component across Windows 11 24H2/25H2/26H1 and Server 2025 enables unauthenticated local attackers to execute arbitrary code with high integrity via heap-based buffer overflow exploitation. CVSS 8.4 (High) reflects low attack complexity and no user interaction requirement, though local access is necessary. …
Sign in for full analysis, threat intelligence, and remediation guidance.
RemediationAI
Within 24 hours: Identify and inventory all Windows 11 (24H2/25H2/26H1) and Server 2025 systems in your environment using endpoint management tools; confirm patch availability from Microsoft Security Updates. Within 7 days: Deploy the available Microsoft Graphics Component security patch across all affected systems, prioritizing servers and workstations with administrative users or sensitive data access; test patches in non-production environments first. …
Sign in for detailed remediation steps.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2026-22609
GHSA-qm5p-p76j-g82x