Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21238: CWE-284: Improper Access Control in Microsoft Windows 10 Version 1607

0
High
VulnerabilityCVE-2026-21238cvecve-2026-21238cwe-284
Published: Tue Feb 10 2026 (02/10/2026, 17:51:46 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1607

Description

Improper access control in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 02/18/2026, 08:32:23 UTC

Technical Analysis

CVE-2026-21238 is a vulnerability classified under CWE-284 (Improper Access Control) affecting Microsoft Windows 10 Version 1607 (build 10.0.14393.0). The flaw resides in the Windows Ancillary Function Driver for WinSock, a component responsible for network socket operations. Due to improper access control mechanisms, an attacker with authorized local access can exploit this vulnerability to elevate their privileges on the system. This means a user with limited rights can gain higher privileges, potentially SYSTEM-level, enabling them to execute arbitrary code, modify system configurations, or disable security controls. The vulnerability does not require user interaction (UI:N) and has a low attack complexity (AC:L), but does require local privileges (PR:L), meaning the attacker must already have some level of access to the system. The scope is unchanged (S:U), indicating the vulnerability affects only the vulnerable component without impacting other system components directly. Confidentiality, integrity, and availability impacts are all rated high, reflecting the potential for full system compromise. No known exploits have been reported in the wild yet, but the vulnerability's characteristics make it a significant risk, especially in environments where Windows 10 Version 1607 is still in use. The lack of available patches at the time of reporting increases the urgency for mitigation planning.

Potential Impact

For European organizations, the impact of CVE-2026-21238 can be severe, particularly for those still operating legacy Windows 10 Version 1607 systems. Successful exploitation allows attackers to escalate privileges locally, potentially leading to full system compromise, data breaches, and disruption of critical services. This is especially concerning for sectors such as finance, healthcare, government, and critical infrastructure, where confidentiality and integrity of data are paramount. The vulnerability could facilitate lateral movement within networks, enabling attackers to access sensitive information or disrupt operations. Since the vulnerability requires local access, it could be exploited by insiders or through initial footholds gained via other attack vectors. The absence of known exploits in the wild currently provides a window for proactive defense, but organizations should not delay remediation efforts. Legacy systems that are no longer supported or patched pose a heightened risk, making them attractive targets for attackers. The overall impact includes potential regulatory and compliance implications under GDPR if personal data is compromised.

Mitigation Recommendations

1. Prioritize upgrading or patching Windows 10 Version 1607 systems as soon as official patches become available from Microsoft. 2. Until patches are released, restrict local access to affected systems by enforcing strict user account controls and limiting administrative privileges. 3. Implement application whitelisting and endpoint detection and response (EDR) solutions to monitor for suspicious privilege escalation attempts. 4. Conduct thorough audits of systems running legacy Windows versions and isolate or segment them within the network to reduce exposure. 5. Enforce multi-factor authentication (MFA) for all user accounts to reduce the risk of initial unauthorized access. 6. Educate users about the risks of local privilege escalation and monitor logs for unusual activity related to WinSock or network driver components. 7. Employ network segmentation to limit the ability of attackers to move laterally after privilege escalation. 8. Develop and test incident response plans specifically addressing privilege escalation scenarios. 9. Consider virtual patching or compensating controls via endpoint security tools if immediate patching is not feasible. 10. Regularly review and update access control policies to ensure least privilege principles are enforced.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-12-11T21:02:05.735Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698b75ff4b57a58fa1209fe4

Added to database: 2/10/2026, 6:16:31 PM

Last enriched: 2/18/2026, 8:32:23 AM

Last updated: 2/21/2026, 12:17:31 AM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats