Description
Concurrent execution using shared resource with improper synchronization ('race condition') in Capability Access Management Service (camsvc) allows an authorized attacker to elevate privileges locally.
Published: 2026-01-13
Score: 7 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Patch
AI Analysis

Impact

The vulnerability in the Capability Access Management Service (camsvc) is a classic race condition caused by improper synchronization of shared resources. When two or more processes access the same critical section concurrently, an attacker can manipulate the timing to trigger a privilege escalation. This flaw permits an authorized local user to elevate leverage to higher privileged levels, compromising confidentiality and integrity of the system. The weaknesses involved are described by CWE‑362 (Race Condition) and CWE‑416 (Use After Free).

Affected Systems

Microsoft Windows Server 2025, including the Server Core deployment, are affected by this flaw. No other operating system versions or product variants are listed as impacted by the CNA. Users running these editions should verify that the server has the latest cumulative updates that address the mentioned issue.

Risk and Exploitability

The CVSS score of 7 denotes a high severity, while the EPSS score of less than 1% indicates a low but non‑zero likelihood of exploitation in the wild. Currently the vulnerability is not catalogued as a known exploited vulnerability by CISA. The attack vector is local, requiring the attacker to already have some level of authorized access. However, once the race condition is triggered the attacker gains elevated privileges, enabling further damage or persistence. Because the flaw is a local privilege escalation, active monitoring of sensitive services and strict least‑privilege controls are essential to mitigate risk until a patch is applied.

Generated by OpenCVE AI on April 16, 2026 at 18:14 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest cumulative update for Windows Server 2025 that contains the fix for CVE‑2026‑20830.
  • Restrict local user accounts from accessing the Capability Access Management Service to prevent the race condition from triggering.
  • If adding the update is delayed, disable or remove the camsvc service from systems that do not require it, or otherwise lock it down until a patch is applied.

Generated by OpenCVE AI on April 16, 2026 at 18:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 13 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 13 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Description Concurrent execution using shared resource with improper synchronization ('race condition') in Capability Access Management Service (camsvc) allows an authorized attacker to elevate privileges locally.
Title Capability Access Management Service (camsvc) Elevation of Privilege Vulnerability
First Time appeared Microsoft
Microsoft windows Server 2025
Weaknesses CWE-362
CWE-416
CPEs cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft windows Server 2025
References
Metrics cvssV3_1

{'score': 7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Windows Server 2025
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-01T13:48:59.620Z

Reserved: 2025-12-03T05:54:20.375Z

Link: CVE-2026-20830

cve-icon Vulnrichment

Updated: 2026-01-13T21:43:26.302Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-13T18:16:10.817

Modified: 2026-01-15T13:06:09.143

Link: CVE-2026-20830

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T18:15:43Z

Weaknesses