Description
Access of resource using incompatible type ('type confusion') in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally.
Published: 2026-01-13
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a type confusion flaw in the Windows Win32K graphics kernel component, specifically the ICOMP interface. An authorized local user can supply crafted input that is interpreted as an incompatible type, allowing the kernel to execute code or alter data with elevated privileges. This results in a local privilege escalation that can enable the attacker to gain system‑level rights on the affected machine.

Affected Systems

Affected systems include Microsoft Windows 11 releases 23H2, 24H2, 25H2, and 22H3, on both x64 and ARM64 architectures, as well as Windows Server 2022 and Windows Server 2025, including their server core installations. The flaw is present across these OS releases and all supported processors noted in the CPE entries.

Risk and Exploitability

The CVSS score of 7.8 categorizes the issue as high severity, and the EPSS score of less than 1 % indicates a low current exploit probability. The bug is not listed in the CISA KEV catalog, suggesting no publicly known exploitation has been reported. Attackers would need local access and the ability to trigger the type confusion via the Win32K subsystem. Once exploited, the attacker can gain ADMIN‑level rights, enabling further compromise of the system, data exfiltration, or deployment of malicious code. Organizations with unpatched Windows 11 or Server machines should prioritize applying the security update immediately.

Generated by OpenCVE AI on April 16, 2026 at 08:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the Microsoft security update that addresses CVE‑2026‑20811 for all affected Windows 11 and Server versions, as outlined on the Microsoft Security Response Center update guide.
  • Reboot the affected systems to apply the updated kernel module and ensure the vulnerability is fully remediated.
  • Deploy endpoint detection and response solutions and monitor for any unusual privilege escalation attempts or anomalous process activity, reinforcing least‑privilege configurations on user accounts.

Generated by OpenCVE AI on April 16, 2026 at 08:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 14 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows Server 2022 23h2
CPEs cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_11_25h2:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*
Vendors & Products Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows Server 2022 23h2
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 13 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Description Access of resource using incompatible type ('type confusion') in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally.
Title Win32k Elevation of Privilege Vulnerability
First Time appeared Microsoft
Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows Server 2022
Microsoft windows Server 2025
Microsoft windows Server 23h2
Weaknesses CWE-822
CWE-843
CPEs cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_25H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows Server 2022
Microsoft windows Server 2025
Microsoft windows Server 23h2
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Windows 11 23h2 Windows 11 23h2 Windows 11 24h2 Windows 11 24h2 Windows 11 25h2 Windows 11 25h2 Windows Server 2022 Windows Server 2022 23h2 Windows Server 2025 Windows Server 23h2
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-01T13:48:20.117Z

Reserved: 2025-12-03T05:54:20.372Z

Link: CVE-2026-20811

cve-icon Vulnrichment

Updated: 2026-01-13T19:40:09.541Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-13T18:16:07.727

Modified: 2026-01-14T20:13:13.357

Link: CVE-2026-20811

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T08:45:26Z

Weaknesses