Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20863: CWE-415: Double Free in Microsoft Windows 11 version 22H3

0
High
VulnerabilityCVE-2026-20863cvecve-2026-20863cwe-415
Published: Tue Jan 13 2026 (01/13/2026, 17:56:57 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 11 version 22H3

Description

Double free in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/02/2026, 00:42:18 UTC

Technical Analysis

CVE-2026-20863 is a vulnerability classified under CWE-415 (Double Free) affecting the Windows 11 operating system, specifically version 22H3 (build 10.0.22631.0). The flaw exists in the Win32K subsystem, particularly within the ICOMP component, where a double free condition can occur. A double free vulnerability happens when a program attempts to free the same memory location twice, leading to undefined behavior such as memory corruption, crashes, or potential execution of arbitrary code. In this case, the vulnerability allows an attacker with authorized local access and low privileges to escalate their privileges to higher levels, potentially SYSTEM or administrator level. The CVSS 3.1 base score is 7.0, indicating high severity, with the vector indicating local attack vector (AV:L), high attack complexity (AC:H), low privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability does not require user interaction but does require the attacker to have some level of access to the system already. No public exploits have been reported yet, and no patches have been released at the time of this report. The vulnerability was reserved in December 2025 and published in January 2026. The presence of this vulnerability in a core Windows component like Win32K makes it a critical target for attackers aiming to gain elevated privileges on compromised machines.

Potential Impact

The primary impact of CVE-2026-20863 is local privilege escalation, enabling attackers with limited access to gain administrative or SYSTEM-level privileges. This can lead to full system compromise, allowing attackers to install persistent malware, disable security controls, access sensitive data, and move laterally within networks. The vulnerability affects confidentiality, integrity, and availability of affected systems. Organizations relying on Windows 11 version 22H3 are at risk, especially those with multiple users or shared environments where local access is possible. The high attack complexity and requirement for local privileges reduce the likelihood of remote exploitation but do not eliminate the risk from insider threats or attackers who have already gained footholds. The absence of known exploits in the wild currently limits immediate widespread impact, but the vulnerability's nature makes it a prime candidate for future exploitation once weaponized. Critical infrastructure, government agencies, and enterprises with sensitive data are particularly vulnerable to the consequences of privilege escalation.

Mitigation Recommendations

Until an official patch is released by Microsoft, organizations should implement the following mitigations: 1) Restrict local access to Windows 11 22H3 systems by enforcing strict access controls and limiting administrative privileges. 2) Monitor systems for unusual local activity or privilege escalation attempts using endpoint detection and response (EDR) tools. 3) Employ application whitelisting and least privilege principles to reduce the attack surface. 4) Disable or restrict use of the affected Win32K ICOMP functionality if feasible through group policies or configuration changes. 5) Maintain up-to-date backups and ensure incident response plans are ready to address potential compromises. 6) Once Microsoft releases a security update, prioritize testing and deployment of the patch across all affected systems. 7) Educate users about the risks of local privilege escalation and the importance of reporting suspicious behavior. These measures help reduce the risk of exploitation and limit potential damage.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-12-03T05:54:20.381Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69668ae0a60475309f9ae12d

Added to database: 1/13/2026, 6:11:44 PM

Last enriched: 3/2/2026, 12:42:18 AM

Last updated: 3/25/2026, 4:28:36 AM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses