Description
Improper input validation in Windows Hello allows an authorized attacker to bypass a security feature locally.
Published: 2026-04-14
Score: 4.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local Windows Hello authentication bypass
Action: Apply Update
AI Analysis

Impact

Improper input validation in Windows Hello enables an authorized user to circumvent the biometric or PIN verification that protects access to credentials, effectively bypassing the local security feature. The flaw is rooted in an unchecked input handling routine, classified as input validation failure. By exploiting this weakness, an attacker can enjoy unauthorized access to protected resources or processes that would otherwise require valid Windows Hello authentication.

Affected Systems

Microsoft Windows 10 releases 21H2 and 22H2, as well as Windows 11 releases 22H3, 23H2, 24H2, 25H2, and 26H1 are susceptible. The vulnerability spans both x86/x64 and arm64 architectures, covering the majority of consumer and enterprise builds listed in the vendor’s update guide.

Risk and Exploitability

The severity score indicates moderate risk, and current evidence shows no widespread exploitation. The condition requires local, authorized access, meaning an attacker must already be present on the system. Nonetheless, bypassing Windows Hello can allow privilege escalation or access to otherwise protected accounts, elevating the risk within a local environment.

Generated by OpenCVE AI on April 14, 2026 at 20:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check whether your machine runs one of the affected Windows 10 or Windows 11 builds listed above.
  • Download and install the cumulative update identified in Microsoft’s update guide for CVE-2026-27906.
  • If the update is not yet available, reduce user privilege on the device and disable local administrative rights for regular accounts.
  • Continuously monitor authentication logs for anomalies indicating an attempt to exploit the Windows Hello bypass.

Generated by OpenCVE AI on April 14, 2026 at 20:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft windows 10 21h2
Microsoft windows 10 22h2
Microsoft windows 11 22h3
Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows 11 26h1
Vendors & Products Microsoft windows 10 21h2
Microsoft windows 10 22h2
Microsoft windows 11 22h3
Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows 11 26h1

Tue, 14 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 17:30:00 +0000

Type Values Removed Values Added
Description Improper input validation in Windows Hello allows an authorized attacker to bypass a security feature locally.
Title Windows Hello Security Feature Bypass Vulnerability
First Time appeared Microsoft
Microsoft windows 10 21h2
Microsoft windows 10 22h2
Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows 11 26h1
Weaknesses CWE-20
CPEs cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_25H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_26H1:*:*:*:*:*:*:arm64:*
Vendors & Products Microsoft
Microsoft windows 10 21h2
Microsoft windows 10 22h2
Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows 11 26h1
References
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Windows 10 21h2 Windows 10 21h2 Windows 10 22h2 Windows 10 22h2 Windows 11 22h3 Windows 11 23h2 Windows 11 23h2 Windows 11 24h2 Windows 11 24h2 Windows 11 25h2 Windows 11 25h2 Windows 11 26h1 Windows 11 26h1
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-20T20:24:29.977Z

Reserved: 2026-02-24T21:35:49.685Z

Link: CVE-2026-27906

cve-icon Vulnrichment

Updated: 2026-04-14T18:03:50.028Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-14T18:16:56.797

Modified: 2026-04-17T15:10:35.607

Link: CVE-2026-27906

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T21:00:09Z

Weaknesses