CVSS VectorNVD

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

1
Analysis Generated
Apr 14, 2026 - 19:20 vuln.today

DescriptionNVD

Use after free in Windows User Interface Core allows an authorized attacker to elevate privileges locally.

AnalysisAI

Local privilege escalation in Windows User Interface Core across Windows 10, 11, and Server 2019-2025 allows low-privileged authenticated attackers to achieve SYSTEM-level access via use-after-free memory corruption. The vulnerability requires high attack complexity and local access but enables container escape (scope change) with full confidentiality, integrity, and availability impact. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Identify all Windows 10, 11, and Server 2019-2025 systems in production, particularly those running containerized workloads or hosting multi-tenant applications. Within 7 days: Apply vendor-released patches to all affected systems, prioritizing containers and virtualized environments first. …

Sign in for detailed remediation steps.

Share

EUVD-2026-22557 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy