Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21238: CWE-284: Improper Access Control in Microsoft Windows 10 Version 1607

0
High
VulnerabilityCVE-2026-21238cvecve-2026-21238cwe-284
Published: Tue Feb 10 2026 (02/10/2026, 17:51:46 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1607

Description

Improper access control in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/22/2026, 00:33:02 UTC

Technical Analysis

CVE-2026-21238 is a vulnerability classified under CWE-284 (Improper Access Control) affecting the Windows Ancillary Function Driver for WinSock in Microsoft Windows 10 Version 1607 (build 10.0.14393.0). This flaw allows an attacker with authorized local access to elevate their privileges on the affected system. The vulnerability arises because the driver does not properly enforce access control policies, enabling a user with limited privileges to perform actions reserved for higher-privileged accounts. The CVSS 3.1 base score is 7.8, indicating high severity, with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, meaning the attack requires local access, low attack complexity, privileges, no user interaction, unchanged scope, and results in high impact on confidentiality, integrity, and availability. No known exploits have been reported in the wild as of the publication date (February 10, 2026). The vulnerability is particularly concerning because privilege escalation can be a critical step in multi-stage attacks, allowing adversaries to gain full control over affected systems. The affected version is an older Windows 10 release, which may still be in use in some enterprise environments due to legacy application dependencies or delayed upgrade cycles. No official patches or mitigation links are provided yet, suggesting that organizations must monitor for updates or consider upgrading to newer Windows versions to mitigate risk.

Potential Impact

The impact of CVE-2026-21238 is significant for organizations still running Windows 10 Version 1607. Successful exploitation allows an attacker with local access and limited privileges to escalate to higher privilege levels, potentially SYSTEM or administrator. This can lead to complete system compromise, including unauthorized access to sensitive data, modification or deletion of critical files, installation of persistent malware, and disruption of system availability. In enterprise environments, this vulnerability could facilitate lateral movement, privilege escalation chains, and bypass of security controls, increasing the risk of data breaches and operational disruptions. Since the vulnerability affects a core networking driver (WinSock), it may also impact network-related operations and security monitoring. Organizations relying on legacy Windows 10 versions, especially in sectors like government, healthcare, finance, and critical infrastructure, face heightened risk due to the potential for targeted attacks leveraging this flaw.

Mitigation Recommendations

To mitigate CVE-2026-21238, organizations should prioritize the following actions: 1) Apply official patches from Microsoft as soon as they become available; monitor Microsoft security advisories closely. 2) If patches are not yet released, consider upgrading affected systems to a supported and fully patched Windows 10 or Windows 11 version to eliminate exposure. 3) Restrict local access to systems running Windows 10 Version 1607 by enforcing strict access controls, limiting user accounts with local login rights, and using endpoint protection solutions to detect suspicious privilege escalation attempts. 4) Implement application whitelisting and least privilege principles to reduce the attack surface. 5) Monitor event logs and security telemetry for unusual privilege escalation activities or anomalies related to WinSock or network drivers. 6) Conduct regular vulnerability assessments and penetration testing focused on privilege escalation vectors. 7) Educate IT staff and users about the risks of running outdated operating system versions and the importance of timely patching and upgrades.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-12-11T21:02:05.735Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698b75ff4b57a58fa1209fe4

Added to database: 2/10/2026, 6:16:31 PM

Last enriched: 3/22/2026, 12:33:02 AM

Last updated: 4/6/2026, 6:11:40 PM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses