Description
Improper link resolution before file access ('link following') in Host Process for Windows Tasks allows an authorized attacker to elevate privileges locally.
Published: 2026-01-13
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Elevation of Privilege
Action: Immediate Patch
AI Analysis

Impact

Improper resolution of symbolic links by the Host Process for Windows Tasks allows an attacker who already has local rights to gain elevated privileges. Because the process fails to validate link targets before access, a crafted link can point to privileged system files, enabling the attacker to write or execute code with higher authority. The vulnerability is classified as CWE‑59, indicating a flaw in indirect file reference handling.

Affected Systems

Microsoft Windows 11 Version 24H2, Microsoft Windows 11 Version 25H2, Microsoft Windows Server 2025, and Microsoft Windows Server 2025 (Server Core) are affected, covering all standard x64 and ARM64 builds specified by the CNA.

Risk and Exploitability

The CVSS base score of 7.8 reflects moderate to high severity, but the EPSS is less than 1% and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, indicating a low likelihood of widespread exploitation. The attack requires local authorization and the ability to create or manipulate symbolic links; it does not provide a remote entry point. If an attacker can craft a link and execute the host process with elevated privileges, they could bypass restricted access controls and execute arbitrary code.

Generated by OpenCVE AI on April 16, 2026 at 08:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the Microsoft security update that resolves the improper link resolution in the Host Process for Windows Tasks.
  • Configure the Local Security Policy to revoke the "Create symbolic link" privilege from non‑administrative accounts, restricting the ability to craft malicious links.
  • As an interim step, disable the Host Process for Windows Tasks service or set its startup type to Manual until the patch is fully deployed.

Generated by OpenCVE AI on April 16, 2026 at 08:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 16 Jan 2026 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft windows 11 24h2
Microsoft windows 11 25h2
CPEs cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_25h2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_25h2:*:*:*:*:*:*:x64:*
Vendors & Products Microsoft windows 11 24h2
Microsoft windows 11 25h2

Tue, 13 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 13 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Description Improper link resolution before file access ('link following') in Host Process for Windows Tasks allows an authorized attacker to elevate privileges locally.
Title Host Process for Windows Tasks Elevation of Privilege Vulnerability
First Time appeared Microsoft
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows Server 2025
Weaknesses CWE-59
CPEs cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_25H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows Server 2025
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Windows 11 24h2 Windows 11 24h2 Windows 11 25h2 Windows 11 25h2 Windows Server 2025
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-01T13:49:20.835Z

Reserved: 2025-12-04T20:04:16.338Z

Link: CVE-2026-20941

cve-icon Vulnrichment

Updated: 2026-01-13T18:30:03.586Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-13T18:16:21.530

Modified: 2026-01-16T15:55:38.877

Link: CVE-2026-20941

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T08:15:29Z

Weaknesses