CVSS VectorNVD

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

1
Analysis Generated
Apr 14, 2026 - 19:30 vuln.today

DescriptionNVD

Use after free in Desktop Window Manager allows an authorized attacker to elevate privileges locally.

AnalysisAI

Desktop Window Manager (DWM) use-after-free memory corruption allows authenticated local attackers to escalate privileges to SYSTEM on all supported Windows 10, Windows 11, and Windows Server versions (2012-2025). The vulnerability enables low-privileged users to gain complete control over affected systems with low attack complexity and no user interaction required. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Inventory all Windows 10, 11, and Server 2012-2025 systems in your environment and identify patch availability for your specific versions from Microsoft Security Updates. Within 7 days: Deploy vendor patches to non-production systems and conduct testing to validate stability and application compatibility. …

Sign in for detailed remediation steps.

Share

CVE-2026-27923 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy