Description
Stack-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally.
Published: 2026-04-14
Score: 7 High
EPSS: < 1% Very Low
KEV: No
Impact: Local Privilege Escalation
Action: Apply Patch
AI Analysis

Impact

A stack‑based buffer overflow in the Windows kernel can be triggered by an authorized local user, allowing that user to gain higher privileges than intended. This flaw pertains to the CWE‑121 weakness, where improper stack handling may lead to code execution at kernel level. The vulnerability can be used to read, modify, or execute memory within the kernel, potentially compromising the entire operating system.

Affected Systems

Microsoft Windows 11 version 26H1 on arm64 processors is affected by the stack overflow flaw. No other versions or variants are listed in this entry.

Risk and Exploitability

The CVSS score of 7 indicates a high severity risk. The EPSS score is not available, and the issue is not included in CISA's Known Exploited Vulnerabilities catalog. Exploitation requires local access to the system; an attacker with authorized privileges can trigger the buffer overflow and achieve system‑wide execution authority. The lack of publicly available exploits suggests that active exploitation is limited to determined internal threats able to launch the exploit locally.

Generated by OpenCVE AI on April 14, 2026 at 20:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Windows 11 to the latest cumulative security update that resolves the kernel stack overflow flaw
  • Limit privileged account use and enforce the principle of least privilege for all users
  • Regularly review Windows event logs for unusual privilege escalation attempts and related kernel activity

Generated by OpenCVE AI on April 14, 2026 at 20:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:microsoft:windows_11_26h1:*:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_26h1:*:*:*:*:*:*:x64:*

Wed, 15 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft windows 11 26h1
Vendors & Products Microsoft windows 11 26h1

Wed, 15 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 17:30:00 +0000

Type Values Removed Values Added
Description Stack-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally.
Title Windows Kernel Elevation of Privilege Vulnerability
First Time appeared Microsoft
Microsoft windows 11 26h1
Weaknesses CWE-121
CPEs cpe:2.3:o:microsoft:windows_11_26H1:*:*:*:*:*:*:arm64:*
Vendors & Products Microsoft
Microsoft windows 11 26h1
References
Metrics cvssV3_1

{'score': 7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft Windows 11 26h1 Windows 11 26h1
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-04-30T14:41:32.606Z

Reserved: 2026-03-11T00:26:53.427Z

Link: CVE-2026-32195

cve-icon Vulnrichment

Updated: 2026-04-15T09:09:12.661Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-14T18:17:25.890

Modified: 2026-04-20T16:37:02.130

Link: CVE-2026-32195

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T21:00:09Z

Weaknesses