Windows Win32k Elevation of Privilege Vulnerability
Plan PatchCVSS 7.8CVE-2026-32222Apr 14, 2026
Microsoft
IT in OT - Windows Server and Active Directory are widely deployed in OT environments
Attack path
Attack VectorLocal
Auth RequiredLow
ComplexityLow
User InteractionNone needed
Summary
A vulnerability in Windows Win32K ICOMP allows a locally authenticated user to elevate privileges through untrusted pointer dereference. An authorized attacker could trigger this flaw to execute arbitrary code at kernel level and take full control of the system.
What this means
What could happen
A user with local access to a Windows system could execute commands with elevated privileges, potentially compromising the integrity of the entire device and any systems it manages or communicates with.
Who's at risk
This vulnerability affects Windows 11 systems (versions 24H2, 25H2, 26H1) and Windows Server 2025 across both x64 and ARM architectures. Any organization running these Windows systems as HMI (Human-Machine Interface) workstations, engineering workstations, or data servers used in OT environments should prioritize patching, as compromise could allow an attacker to modify industrial control parameters, disable safety interlocks, or disrupt remote management capabilities.
How it could be exploited
An attacker with local user access executes specially crafted code that triggers an untrusted pointer dereference in the Windows Win32K driver, causing the kernel to execute attacker-controlled instructions at elevated privilege level.
Prerequisites
- Local user account on the affected Windows system
- Code execution capability as a standard user
Low complexity attackLow authentication required (local user)High impact to confidentiality, integrity, and availability
Exploitability
Unlikely to be exploited — EPSS score 0.0%
Affected products (8)
8 with fix
ProductAffected VersionsFix Status
Remediation & Mitigation
0/1
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
Windows Server 2025
HOTFIXInstall the April 2026 Windows security update for your version and architecture (Windows 11 26H1/25H2/24H2 or Windows Server 2025) to patch the Win32K vulnerability
CVEs (1)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/39c27949-4921-427f-9bf7-928b6e87c746Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.