PT-2026-7404 · Microsoft · Windows
Published
2026-02-10
·
Updated
2026-03-12
·
CVE-2026-21519
CVSS v3.1
7.8
7.8
High
| Base vector | Vector | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Microsoft Windows (affected versions not specified)
Description
A type confusion issue in the Desktop Window Manager component allows an authorized attacker to elevate privileges locally. This issue is actively exploited and has been observed in real-world attacks. Successful exploitation allows an attacker to gain SYSTEM-level privileges. The vulnerability affects Windows 10, Windows 11, and Windows Server versions. Approximately an unknown number of devices worldwide are potentially affected. The vulnerability allows a local attacker to escalate from a standard user to SYSTEM without user interaction. Exploitation of this flaw can lead to full system takeover, enabling persistence, data theft, and rapid lateral movement.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
LPE
Type Confusion
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
BDU:2026-01702
CVE-2026-21519
Affected Products
Windows
References · 27
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21519 · Security Note
- https://bdu.fstec.ru/vul/2026-01702 · Security Note
- https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2026-21519 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-21519 · Security Note
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21519 · Vendor Advisory
- https://safe-surf.ru/specialists/bulletins-nkcki/729090 · Security Note
- https://cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-21519 · Note
- https://cisa.gov/sites/default/files/csv/known_exploited_vulnerabilities.csv · Note
- https://twitter.com/dailytechonx/status/2021967540616880167 · Twitter Post
- https://twitter.com/ScyScan/status/2021345394815533436 · Twitter Post
- https://t.me/ZerodayAlert/615 · Telegram Post
- https://twitter.com/Mahendrak29/status/2021410042688528386 · Twitter Post
- https://twitter.com/ByteVanguardSec/status/2022134847993483751 · Twitter Post
- https://twitter.com/grok/status/2021532073614360921 · Twitter Post
- https://twitter.com/ThreatSynop/status/2021573910152483303 · Twitter Post