Description
Out-of-bounds read in Windows GDI allows an unauthorized attacker to disclose information locally.
Published: 2026-04-14
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local Information Disclosure
Action: Apply Patch
AI Analysis

Impact

An out‑of‑bounds read in the Windows GDI subsystem allows an unauthorized attacker to read memory beyond the intended bounds, exposing sensitive information that resides in the local process memory. The weakness is identified as a buffer overread (CWE‑125) and does not provide direct code execution or privilege escalation capabilities.

Affected Systems

The vulnerability affects Microsoft Windows 10 releases 21H2 and 22H2, Windows 11 releases 22H3, 23H2, 24H2, 25H2 and 26H1, as well as Windows Server 2022 and Windows Server 2025, including their Server Core installations.

Risk and Exploitability

The base CVSS score of 5.5 indicates moderate severity. EPSS data is not available and the vulnerability is not listed as a Known Exploited Vulnerability by CISA. The description suggests that an attacker must be able to execute code locally or otherwise interact with the system directly; remote exploitation is not indicated and is therefore considered unlikely. In environments where sensitive data is processed locally, the risk of information leakage remains moderate but is limited to users with local access.

Generated by OpenCVE AI on April 14, 2026 at 21:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Download and install the Windows security update for CVE-2026-27931 from the Microsoft Security Update Guide.
  • Reboot the affected system after the update is applied.
  • Confirm that the update has been installed by checking the update history or the audit log.
  • If the update cannot be applied immediately, work with Microsoft support or the system administrator to plan a phased deployment.
  • Maintain a short‑cycle patch policy to ensure future updates addressing this vulnerability are applied promptly.

Generated by OpenCVE AI on April 14, 2026 at 21:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft windows 10 21h2
Microsoft windows 10 22h2
Microsoft windows 11 22h3
Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows 11 26h1
Microsoft windows Server 2022, 23h2 Edition (server Core Installation)
Microsoft windows Server 2025 (server Core Installation)
Vendors & Products Microsoft windows 10 21h2
Microsoft windows 10 22h2
Microsoft windows 11 22h3
Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows 11 26h1
Microsoft windows Server 2022, 23h2 Edition (server Core Installation)
Microsoft windows Server 2025 (server Core Installation)

Tue, 14 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 17:30:00 +0000

Type Values Removed Values Added
Description Out-of-bounds read in Windows GDI allows an unauthorized attacker to disclose information locally.
Title Windows GDI Information Disclosure Vulnerability
First Time appeared Microsoft
Microsoft windows 10 21h2
Microsoft windows 10 22h2
Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows 11 26h1
Microsoft windows Server 2022
Microsoft windows Server 2025
Microsoft windows Server 23h2
Weaknesses CWE-125
CPEs cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*
cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_25H2:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_26H1:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft windows 10 21h2
Microsoft windows 10 22h2
Microsoft windows 11 23h2
Microsoft windows 11 24h2
Microsoft windows 11 25h2
Microsoft windows 11 26h1
Microsoft windows Server 2022
Microsoft windows Server 2025
Microsoft windows Server 23h2
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Windows 10 21h2 Windows 10 21h2 Windows 10 22h2 Windows 10 22h2 Windows 11 22h3 Windows 11 23h2 Windows 11 23h2 Windows 11 24h2 Windows 11 24h2 Windows 11 25h2 Windows 11 25h2 Windows 11 26h1 Windows 11 26h1 Windows Server 2022 Windows Server 2022, 23h2 Edition (server Core Installation) Windows Server 2025 Windows Server 2025 (server Core Installation) Windows Server 23h2
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-15T21:54:17.041Z

Reserved: 2026-02-24T21:35:49.688Z

Link: CVE-2026-27931

cve-icon Vulnrichment

Updated: 2026-04-14T19:03:41.906Z

cve-icon NVD

Status : Received

Published: 2026-04-14T18:17:06.280

Modified: 2026-04-14T18:17:06.280

Link: CVE-2026-27931

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T21:00:09Z

Weaknesses