MSRC compact vulnerability detail

CVE-2026-24283 · Multiple UNC Provider Kernel Driver Elevation of Privilege Vulnerability

Heap-based buffer overflow in Windows File Server allows an authorized attacker to elevate privileges locally.

Severity
Important
Impact
Elevation of Privilege
CVSS
8.8 base · 7.7 temporal
Release
2026-03-10
Signals
Windows File Server Elevation of Privilege Exploited: No Publicly disclosed: No Exploitability: Exploitation Less Likely
CWE
Patch Diff
Loading module diff metadata...
Resolved binary override
Use this when the MSRC module name cannot be mapped automatically or the resolved binary looks wrong.
Old version New version
Description
Heap-based buffer overflow in Windows File Server allows an authorized attacker to elevate privileges locally.
FAQ / Articles
Windows File Server Elevation of Privilege Vulnerability
Heap-based buffer overflow in Windows File Server allows an authorized attacker to elevate privileges locally.
FAQ
What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
FAQ
According to the CVSS score, this vulnerability has Scope: Changed (S:C). What does this mean? A CVSS Scope change (S:C) means that successful exploitation of this vulnerability allows an attacker to access resources outside the original security boundary of the vulnerable component. In this case, the vulnerable code runs within a restricted AppContainer environment, and exploitation could allow an attacker to access sensitive user data outside of that sandbox. Although this does not provide full system control, it represents a break out of the intended isolation boundary.