FAQ
What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Use after free in Data Deduplication allows an authorized attacker to elevate privileges locally.