Description
Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.
Published: 2026-01-13
Score: 7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

This vulnerability is a use‑after‑free flaw in the Inbox COM objects provided with the Microsoft Windows Software Development Kit. The flaw permits an attacker to supply malicious input that frees an object and then re‑uses the freed memory, enabling the execution of arbitrary code on the local host. The vulnerability is classified as CWE‑416 (Use After Free). Although the advisory states the code is executed locally, the CVE title and typical behavior of COM components imply that remote exploitation may be possible if the attacker can trigger the vulnerable object from a remote service or application.

Affected Systems

The affected product is the Microsoft Windows SDK, as identified by the CNA’s product list. Specific version information is not supplied in the advisory, so administrators should verify whether their installed SDK includes the Inbox COM objects and determine if the vulnerability applies to their environment.

Risk and Exploitability

The CVSS score of 7 indicates moderate severity. The EPSS score is less than 1 %, implying a very low probability that active exploitation is occurring in the wild. The vulnerability is not currently listed in the CISA KEV catalog. Exploitation requires the attacker to obtain a privilege level that can instantiate the vulnerable COM object, typically through a local user account or a compromised application. This indicates a local or privilege‑escalation attack surface, while remote exploitation would require additional context on how Outlook or similar components interact with the SDK. Based on the description, it is inferred that the attacker must be able to run code in a context that can load or manipulate the problematic COM object.

Generated by OpenCVE AI on April 16, 2026 at 08:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Download and install the latest Windows SDK update that addresses the use‑after‑free flaw.
  • If an update cannot be applied immediately, uninstall or block the Windows SDK’s Inbox COM components to prevent exploitation.
  • Enforce the principle of least privilege by limiting which users and applications can load COM objects, reducing the risk of an attacker exploiting the flaw.

Generated by OpenCVE AI on April 16, 2026 at 08:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 14 Jan 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft windows Software Development Kit
CPEs cpe:2.3:a:microsoft:windows_software_development_kit:*:*:*:*:*:*:*:*
Vendors & Products Microsoft windows Software Development Kit

Tue, 13 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 13 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Description Use after free in Inbox COM Objects allows an unauthorized attacker to execute code locally.
Title Inbox COM Objects (Global Memory) Remote Code Execution Vulnerability
First Time appeared Microsoft
Microsoft .windows Sdk
Weaknesses CWE-416
CPEs cpe:2.3:a:microsoft:.windows_sdk:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft .windows Sdk
References
Metrics cvssV3_1

{'score': 7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft .windows Sdk Windows Software Development Kit
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-01T13:49:05.986Z

Reserved: 2025-12-11T21:02:05.731Z

Link: CVE-2026-21219

cve-icon Vulnrichment

Updated: 2026-01-13T20:18:44.892Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-13T18:16:24.580

Modified: 2026-02-09T20:37:59.127

Link: CVE-2026-21219

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T08:15:29Z

Weaknesses