Description
Free of memory not on the heap in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
Published: 2026-01-13
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Privilege Escalation
Action: Apply Patch
AI Analysis

Impact

A free‑of‑memory bug in the Windows Ancillary Function Driver for WinSock allows an attacker with local authorization to elevate privileges. The vulnerability occurs when memory not allocated on the heap is improperly freed, creating a scenario that can be leveraged to replace system components or execute privileged code. Local privilege escalation can enable the attacker to bypass authentication controls, access protected data, and execute arbitrary code with higher authority, potentially compromising system integrity and availability.

Affected Systems

Microsoft Windows 10 versions 1809, 21H2, and 22H2, as well as Windows Server 2019 and the Server Core installation of Windows Server 2019 are affected. Both x86 and x64 architectures are included, depending on the specific version.

Risk and Exploitability

The CVSS score of 7.8 indicates a high severity for a local privilege escalation. However, the EPSS score is reported as less than 1%, suggesting the likelihood of exploitation is low at present. The vulnerability is not listed in the CISA KEV catalog. The attack vector is inferred to be local, requiring the attacker to have authenticated access to the target system. Due to the local nature and low exploit probability, the overall risk is moderate, though the potential impact of privilege escalation remains significant.

Generated by OpenCVE AI on April 16, 2026 at 08:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest Windows security update that addresses the WinSock Ancillary Function Driver vulnerability
  • Restrict local accounts to only the minimum privileges required and disable unnecessary privileged actions
  • Monitor event logs for signs of privilege escalation attempts and keep the system patched regularly

Generated by OpenCVE AI on April 16, 2026 at 08:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 14 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft windows 10 21h2
Microsoft windows 10 22h2
CPEs cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*
Vendors & Products Microsoft windows 10 21h2
Microsoft windows 10 22h2
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 13 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Description Free of memory not on the heap in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
Title Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
First Time appeared Microsoft
Microsoft windows 10 1809
Microsoft windows 10 21h2
Microsoft windows 10 22h2
Microsoft windows Server 2019
Weaknesses CWE-590
CPEs cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft windows 10 1809
Microsoft windows 10 21h2
Microsoft windows 10 22h2
Microsoft windows Server 2019
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Windows 10 1809 Windows 10 21h2 Windows 10 21h2 Windows 10 22h2 Windows 10 22h2 Windows Server 2019
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-01T13:48:19.243Z

Reserved: 2025-12-03T05:54:20.372Z

Link: CVE-2026-20810

cve-icon Vulnrichment

Updated: 2026-01-13T19:40:21.980Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-13T18:16:07.547

Modified: 2026-01-14T20:12:30.473

Link: CVE-2026-20810

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T08:45:26Z

Weaknesses