Description
Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally.
Published: 2026-02-10
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a heap-based buffer overflow in the Windows Kernel. An authorized local attacker can exploit this flaw to gain higher privileges on the affected system. The exploit does not provide arbitrary code execution explicitly within the CVE description, but the elevation of privilege can potentially allow the attacker to modify protected data or configure the system to their advantage.

Affected Systems

Microsoft Windows 11 versions 24H2, 25H2 and 26H1 as well as Microsoft Windows Server 2025, including Server Core installations, are affected. Vulnerable builds include both x64 and arm64 platforms.

Risk and Exploitability

The CVSS score of 7.8 indicates a high severity of the flaw. The EPSS score of less than 1% suggests that exploitation is considered unlikely at present. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is local, requiring the attacker to have authorized access to the target machine, such as a compromised user account or access to a privileged third‑party driver.

Generated by OpenCVE AI on April 15, 2026 at 17:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the Windows update that includes the fix for CVE-2026-21245 on all affected Windows 11 and Windows Server 2025 systems.
  • Disable or limit local administrator accounts that are not required for business operations to reduce the pool of privileged users.
  • Enforce kernel module signing and restrict installation of third‑party drivers to prevent the execution of unsigned or malicious kernel code.

Generated by OpenCVE AI on April 15, 2026 at 17:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Feb 2026 12:30:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft windows 11 26h1
Microsoft windows Server 2025 (server Core Installation)
Vendors & Products Microsoft windows 11 26h1
Microsoft windows Server 2025 (server Core Installation)

Wed, 11 Feb 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft windows 11 24h2
Microsoft windows 11 25h2
Weaknesses CWE-787
CPEs cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_25h2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_25h2:*:*:*:*:*:*:x64:*
Vendors & Products Microsoft windows 11 24h2
Microsoft windows 11 25h2

Tue, 10 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Description Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally.
Title Windows Kernel Elevation of Privilege Vulnerability
First Time appeared Microsoft
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows 11 26h1
Microsoft windows Server 2025
Weaknesses CWE-122
CPEs cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_25H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_26H1:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_26H1:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows 11 26h1
Microsoft windows Server 2025
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Windows 11 24h2 Windows 11 24h2 Windows 11 25h2 Windows 11 25h2 Windows 11 26h1 Windows 11 26h1 Windows Server 2025 Windows Server 2025 (server Core Installation)
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-10T13:21:28.820Z

Reserved: 2025-12-11T21:02:05.735Z

Link: CVE-2026-21245

cve-icon Vulnrichment

Updated: 2026-02-25T15:42:49.831Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-10T18:16:25.843

Modified: 2026-02-11T20:44:29.940

Link: CVE-2026-21245

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T17:45:10Z

Weaknesses