CVSS VectorNVD

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

1
Analysis Generated
Apr 14, 2026 - 19:13 vuln.today

DescriptionNVD

Use after free in Windows Shell allows an authorized attacker to elevate privileges locally.

AnalysisAI

Windows Shell use-after-free memory corruption enables local privilege escalation to SYSTEM on Windows 11 (all versions 22H3 through 26H1) and Windows Server 2022/2025. Authenticated low-privileged users can exploit freed memory references in Shell components despite high attack complexity requirements. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Identify all Windows 11 (22H3-26H1) and Windows Server 2022/2025 systems in your environment using inventory tools. Within 7 days: Test vendor-released patches in a non-production environment and document compatibility with line-of-business applications. …

Sign in for detailed remediation steps.

Share

CVE-2026-26165 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy