Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21247: CWE-20: Improper Input Validation in Microsoft Windows 10 Version 1607

0
High
VulnerabilityCVE-2026-21247cvecve-2026-21247cwe-20cwe-122cwe-125
Published: Tue Feb 10 2026 (02/10/2026, 17:51:20 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1607

Description

Improper input validation in Windows Hyper-V allows an authorized attacker to execute code locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/22/2026, 00:34:53 UTC

Technical Analysis

CVE-2026-21247 is a vulnerability identified in Microsoft Windows 10 Version 1607 (build 14393.0) specifically within the Hyper-V virtualization platform. The root cause is improper input validation (CWE-20), which can lead to memory corruption issues (implied by related CWEs 122 and 125) allowing an authorized attacker to execute arbitrary code locally. The attacker must have limited privileges on the system and require some user interaction to trigger the vulnerability. Successful exploitation could lead to full compromise of the affected system, impacting confidentiality, integrity, and availability. Hyper-V is a critical component for virtualization, often used in enterprise environments for running virtual machines. Although no public exploits are known at this time, the vulnerability’s characteristics and CVSS score of 7.3 indicate a high risk if weaponized. The vulnerability was published in February 2026, with the initial reservation in December 2025. No patches or mitigations are explicitly linked in the provided data, suggesting organizations must monitor for updates or apply workarounds. The vulnerability affects a legacy Windows 10 version, which is still in use in some organizations due to compatibility or lifecycle reasons, especially in industrial, government, or specialized enterprise environments.

Potential Impact

The impact of CVE-2026-21247 is significant for organizations running Windows 10 Version 1607 with Hyper-V enabled. An attacker with limited local privileges and user interaction capability can escalate privileges and execute arbitrary code, potentially gaining full control over the host system. This can lead to data breaches, disruption of virtualized workloads, and compromise of sensitive information. The vulnerability affects confidentiality, integrity, and availability, making it a critical risk in environments relying on virtualization for critical applications. Organizations using legacy Windows 10 versions in sectors such as government, healthcare, manufacturing, and finance may face increased risk due to the potential for lateral movement and persistence within networks. The lack of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time. The scope is limited to Windows 10 Version 1607, but the impact on affected systems is severe.

Mitigation Recommendations

1. Apply official security patches from Microsoft as soon as they become available for Windows 10 Version 1607. Monitor Microsoft security advisories closely. 2. If patching is not immediately possible, consider disabling Hyper-V on affected systems to eliminate the attack surface. 3. Restrict local user privileges and enforce the principle of least privilege to reduce the likelihood of exploitation. 4. Implement strict user interaction policies and educate users about the risks of executing untrusted code or actions. 5. Use endpoint detection and response (EDR) tools to monitor for suspicious activities related to Hyper-V processes and privilege escalation attempts. 6. Consider upgrading to a supported and fully patched version of Windows 10 or later to reduce exposure to legacy vulnerabilities. 7. Conduct regular vulnerability assessments and penetration testing focusing on virtualization components. 8. Employ network segmentation to isolate critical systems running Hyper-V to limit lateral movement in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-12-11T21:02:05.736Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698b76004b57a58fa120a01e

Added to database: 2/10/2026, 6:16:32 PM

Last enriched: 3/22/2026, 12:34:53 AM

Last updated: 4/6/2026, 6:12:07 PM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses