Description
Concurrent execution using shared resource with improper synchronization ('race condition') in Capability Access Management Service (camsvc) allows an authorized attacker to elevate privileges locally.
Published: 2026-01-13
Score: 7 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Patch Now
AI Analysis

Impact

A concurrency flaw in Capability Access Management Service (camsvc) allows a race condition when multiple threads access a shared resource without proper synchronization. The flaw can be exploited by an authorized local user to gain higher privileges than permitted, potentially enabling the execution of arbitrary code with elevated rights.

Affected Systems

Microsoft Windows 11 24H2 and 25H2, and Windows Server 2025 (including Server Core installations) are affected.

Risk and Exploitability

The vulnerability scores a CVSS of 7, indicating a high impact if exploited. The EPSS score is < 1%, suggesting currently low exploitation probability, and it is not listed in the CISA KEV catalog. Likely, an attacker must have local administrator or domain user permissions and exploit the race condition by triggering concurrent access to camsvc. The attack requires the presence of the service and the deliberate timing of operations, which makes the exploit complex but feasible for a determined local attacker.

Generated by OpenCVE AI on April 16, 2026 at 08:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the Microsoft security update for Windows 11 24H2 and 25H2 that fixes the camsvc race condition.
  • Install the corresponding Windows Server 2025 update on all Server Core installations.
  • Configure local security policies to limit privileged actions for non‑administrator accounts and enable audit logging for privilege changes.

Generated by OpenCVE AI on April 16, 2026 at 08:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 14 Jan 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft windows 11 24h2
Microsoft windows 11 25h2
CPEs cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_11_25h2:*:*:*:*:*:*:*:*
Vendors & Products Microsoft windows 11 24h2
Microsoft windows 11 25h2

Wed, 14 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 13 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Description Concurrent execution using shared resource with improper synchronization ('race condition') in Capability Access Management Service (camsvc) allows an authorized attacker to elevate privileges locally.
Title Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability
First Time appeared Microsoft
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows Server 2025
Weaknesses CWE-362
CPEs cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_25H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows Server 2025
References
Metrics cvssV3_1

{'score': 7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Windows 11 24h2 Windows 11 24h2 Windows 11 25h2 Windows 11 25h2 Windows Server 2025
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-01T13:48:21.855Z

Reserved: 2025-12-03T05:54:20.373Z

Link: CVE-2026-20815

cve-icon Vulnrichment

Updated: 2026-01-13T19:39:37.164Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-13T18:16:08.273

Modified: 2026-01-14T20:27:14.820

Link: CVE-2026-20815

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T08:45:26Z

Weaknesses