PT-2026-40204 · Microsoft · Windows Kernel+1
Published
2026-05-12
·
Updated
2026-05-20
·
CVE-2026-40369
CVSS v3.1
7.8
High
| Vector | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Windows 11 24H2
Windows 11 25H2
Description
An untrusted pointer dereference in the Windows Kernel allows an authorized attacker to elevate privileges locally. The issue exists within
ntoskrnl.exe in the ExpGetProcessInformation() function. When using the 'NtQuerySystemInformation' endpoint with info class 253 and a length argument of zero, the ProbeForWrite guard is bypassed because it is wrapped in an if (Length) check. This allows a caller-supplied kernel address to be processed without validation, resulting in an arbitrary kernel address increment. This primitive can be reached from browser render process sandboxes, such as those in Chrome, Edge, and Firefox, potentially enabling a sandbox escape.Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Exploit
LPE
Untrusted Pointer Dereference
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Windows
Windows Kernel