Description
Double free in Windows Kernel allows an authorized attacker to elevate privileges locally.
Published: 2026-04-14
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Apply Patch
AI Analysis

Impact

Double free bug allows an authorized local attacker to gain elevated code execution, potentially compromising system integrity and confidentiality. This flaw exists in the Windows kernel and is classified as CWE‑415. By exploiting the free vulnerability, an attacker can bypass security boundaries and run arbitrary code with kernel privileges, enabling full system takeover.

Affected Systems

Microsoft Windows 11 versions 23H2, 24H2, 25H2, 22H3, and 26H1 across both ARM64 and x64 architectures, as well as Windows Server 2022 (23H2 Edition Server Core), Windows Server 2025 and the Server Core installation of the 2025 release are all affected.

Risk and Exploitability

The CVSS score of 7.8 indicates high severity. EPSS information is not available, and the vulnerability is not listed in the CISA KEV catalog, suggesting moderate risk of widespread exploitation yet still significant due to local attacker capability. The likely attack vector is a local authorized user triggering the double free, which can lead to privilege escalation if the user has sufficient rights to influence kernel memory management.

Generated by OpenCVE AI on April 14, 2026 at 18:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for the latest security update for CVE-2026-26179 on the Microsoft Update Catalog or MSRC page.
  • Download and install the corresponding patch for the affected Windows 11 or Windows Server version.
  • Reboot the system to apply kernel changes.
  • Verify the installation by checking the update history for the CVE-2026-26179 patch.
  • Monitor for any anomalous behavior or unauthorized privilege changes.

Generated by OpenCVE AI on April 14, 2026 at 18:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft windows 11 22h3
Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows 11 26h1
Microsoft windows Server 2022, 23h2 Edition (server Core Installation)
Microsoft windows Server 2025 (server Core Installation)
Vendors & Products Microsoft windows 11 22h3
Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows 11 26h1
Microsoft windows Server 2022, 23h2 Edition (server Core Installation)
Microsoft windows Server 2025 (server Core Installation)

Tue, 14 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 17:30:00 +0000

Type Values Removed Values Added
Description Double free in Windows Kernel allows an authorized attacker to elevate privileges locally.
Title Windows Kernel Elevation of Privilege Vulnerability
First Time appeared Microsoft
Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows 11 26h1
Microsoft windows Server 2025
Microsoft windows Server 23h2
Weaknesses CWE-415
CPEs cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_25H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_26H1:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows 11 26h1
Microsoft windows Server 2025
Microsoft windows Server 23h2
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Windows 11 22h3 Windows 11 23h2 Windows 11 23h2 Windows 11 24h2 Windows 11 24h2 Windows 11 25h2 Windows 11 25h2 Windows 11 26h1 Windows 11 26h1 Windows Server 2022, 23h2 Edition (server Core Installation) Windows Server 2025 Windows Server 2025 (server Core Installation) Windows Server 23h2
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-15T21:54:07.886Z

Reserved: 2026-02-11T18:33:57.777Z

Link: CVE-2026-26179

cve-icon Vulnrichment

Updated: 2026-04-14T19:37:13.487Z

cve-icon NVD

Status : Received

Published: 2026-04-14T18:16:54.013

Modified: 2026-04-14T18:16:54.013

Link: CVE-2026-26179

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T21:00:09Z

Weaknesses