FAQ
What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
External control of file name or path in Windows Kernel allows an authorized attacker to elevate privileges locally.