Description
Use after free in Desktop Window Manager allows an authorized attacker to elevate privileges locally.
Published: 2026-04-14
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Privilege Escalation
Action: Patch
AI Analysis

Impact

An use‑after‑free flaw in the Desktop Window Manager component permits an attacker with local or authorized access to corrupt memory and gain elevated privileges. The vulnerability enables the execution of arbitrary code under the context of a higher‑privileged account, potentially compromising confidentiality, integrity, and availability on the affected machine. The weakness corresponds to an unsafe handling of freed memory resources.

Affected Systems

Systems affected include Windows 10 version 21H2 and 22H2, Windows 11 version 23H2 and 22H3, and Windows Server 2022 and the 23H2 Edition running Server Core. The issue exists on x86, x64, and ARM64 architectures as indicated by the affected CPE entries. Administrators should verify whether these operating system builds are present in their environment.

Risk and Exploitability

The severity rating is CVSS 7.8, indicating a moderate to high impact. Exploitability is not quantified by an EPSS score and the vulnerability is not listed in the KEV catalog, suggesting it has not yet seen widespread exploitation. The attack requires local, authorized access and relies on an earlier use‑after‑free condition, meaning a typical attacker must first obtain some local foothold. Once the memory corruption occurs, privilege escalation is possible within the same session.

Generated by OpenCVE AI on April 14, 2026 at 19:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest Windows security updates that address this Desktop Window Manager flaw.
  • If an update is not yet available, limit access to the Desktop Window Manager service and monitor for anomalous activity.
  • Regularly review system logs for signs of privilege escalation attempts.

Generated by OpenCVE AI on April 14, 2026 at 19:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft windows 10 21h2
Microsoft windows 10 22h2
Microsoft windows 11 22h3
Microsoft windows 11 23h2
Microsoft windows Server 2022, 23h2 Edition (server Core Installation)
Vendors & Products Microsoft windows 10 21h2
Microsoft windows 10 22h2
Microsoft windows 11 22h3
Microsoft windows 11 23h2
Microsoft windows Server 2022, 23h2 Edition (server Core Installation)

Tue, 14 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 17:30:00 +0000

Type Values Removed Values Added
Description Use after free in Desktop Window Manager allows an authorized attacker to elevate privileges locally.
Title Desktop Window Manager Elevation of Privilege Vulnerability
First Time appeared Microsoft
Microsoft windows 10 21h2
Microsoft windows 10 22h2
Microsoft windows 11 23h2
Microsoft windows Server 2022
Microsoft windows Server 23h2
Weaknesses CWE-416
CPEs cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft windows 10 21h2
Microsoft windows 10 22h2
Microsoft windows 11 23h2
Microsoft windows Server 2022
Microsoft windows Server 23h2
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Windows 10 21h2 Windows 10 21h2 Windows 10 22h2 Windows 10 22h2 Windows 11 22h3 Windows 11 23h2 Windows 11 23h2 Windows Server 2022 Windows Server 2022, 23h2 Edition (server Core Installation) Windows Server 23h2
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-15T21:54:14.773Z

Reserved: 2026-02-24T21:35:49.687Z

Link: CVE-2026-27924

cve-icon Vulnrichment

Updated: 2026-04-14T19:35:42.856Z

cve-icon NVD

Status : Received

Published: 2026-04-14T18:17:03.020

Modified: 2026-04-14T18:17:03.020

Link: CVE-2026-27924

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T21:00:09Z

Weaknesses