Description
Use after free in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally.
Published: 2026-01-13
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Local privilege escalation via use‑after‑free in the Win32K subsystem.
Action: Patch immediately
AI Analysis

Impact

The vulnerability is a use‑after‑free defect in the Windows 11 Win32K kernel subsystem that is triggered when the ICOMP interface is accessed. A locally authenticated user can exploit the defect to execute arbitrary code in kernel mode, thereby gaining full control of the system. The flaw arises from incorrect handling of freed memory, allowing the attacker to override control data and run malicious code. This results in a loss of confidentiality, integrity, and availability for the affected machine.

Affected Systems

Affected Microsoft products include Windows 11 Version 24H2, Windows 11 Version 25H2, Windows Server 2025, and Windows Server 2025 (Server Core). The CPE entries specify arm64 versions, indicating that arm64 builds are affected; it is inferred that x86‑64 builds are also impacted, though this is not explicitly detailed in the supplier statement.

Risk and Exploitability

The CVSS score of 7.8 classifies the issue as high severity. However, the EPSS score of less than one percent indicates a very low likelihood that the flaw will be exploited in the wild, and no entry is found in the CISA KEV catalog. The exploitation requires the attacker to have a legitimate local account and the ability to invoke the ICOMP interface. Once the use‑after‑free is triggered, kernel‑level execution is achieved, giving the attacker a full‑privilege compromise. Consequently, the risk for environments that expose the vulnerable interface remains high, but the probability of active exploitation is presently low.

Generated by OpenCVE AI on April 18, 2026 at 06:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the Windows security update that resolves CVE‑2026‑20870 for all affected versions (24H2, 25H2, and Server 2025).
  • Reboot each system immediately after applying the update to ensure the kernel patch takes effect.
  • If a patch cannot be deployed, isolate the affected systems from administrative networks and implement temporary controls to limit access to the Win32K ICOMP interface until a vendor fix is available.

Generated by OpenCVE AI on April 18, 2026 at 06:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 15 Jan 2026 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft windows 11 24h2
Microsoft windows 11 25h2
CPEs cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_11_25h2:*:*:*:*:*:*:*:*
Vendors & Products Microsoft windows 11 24h2
Microsoft windows 11 25h2

Tue, 13 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 13 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Description Use after free in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally.
Title Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
First Time appeared Microsoft
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows Server 2025
Weaknesses CWE-416
CPEs cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_25H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows Server 2025
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Windows 11 24h2 Windows 11 24h2 Windows 11 25h2 Windows 11 25h2 Windows Server 2025
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-01T13:49:10.017Z

Reserved: 2025-12-03T05:54:20.382Z

Link: CVE-2026-20870

cve-icon Vulnrichment

Updated: 2026-01-13T19:09:23.904Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-13T18:16:16.650

Modified: 2026-01-15T15:47:31.830

Link: CVE-2026-20870

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T06:45:23Z

Weaknesses