Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21525: CWE-476: NULL Pointer Dereference in Microsoft Windows 10 Version 1607

0
Medium
VulnerabilityCVE-2026-21525cvecve-2026-21525cwe-476
Published: Tue Feb 10 2026 (02/10/2026, 17:51:34 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1607

Description

Null pointer dereference in Windows Remote Access Connection Manager allows an unauthorized attacker to deny service locally.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 22:01:33 UTC

Technical Analysis

CVE-2026-21525 is a vulnerability classified under CWE-476 (NULL Pointer Dereference) affecting Microsoft Windows 10 Version 1607 (build 10.0.14393.0). The flaw exists in the Remote Access Connection Manager, a component responsible for managing remote access connections. A null pointer dereference occurs when the software attempts to access or manipulate memory through a pointer that is null or uninitialized, leading to a crash of the affected process. In this case, an unauthorized attacker with local access can trigger this condition, causing the Remote Access Connection Manager service to crash and resulting in a denial of service (DoS) condition. The vulnerability does not require any privileges or user interaction, which lowers the barrier for exploitation but limits the attack vector to local attackers. The CVSS v3.1 base score is 6.2, reflecting a medium severity primarily due to the impact on availability and ease of exploitation. No known exploits have been reported in the wild, and no official patches or mitigations have been published at the time of this report. The vulnerability affects only Windows 10 Version 1607, an older release that has reached end of mainstream support, reducing the number of potentially vulnerable systems. However, legacy systems in certain environments may still be at risk. The flaw does not compromise confidentiality or integrity but can disrupt remote access capabilities, potentially impacting business continuity in environments relying on this service.

Potential Impact

The primary impact of CVE-2026-21525 is a denial of service condition affecting the availability of the Remote Access Connection Manager service on Windows 10 Version 1607 systems. Organizations relying on remote access services on legacy Windows 10 installations may experience service interruptions, potentially disrupting remote connectivity and related operations. Although the vulnerability does not allow privilege escalation, data theft, or system compromise, the loss of remote access functionality can hinder administrative tasks, remote work, and access to critical resources. This could be particularly impactful in environments where remote access is essential for business continuity, such as remote offices, telecommuting setups, or managed service provider environments. Since exploitation requires local access, the threat is somewhat limited to insiders or attackers who have already gained some foothold on the system. The lack of known exploits in the wild reduces immediate risk, but unpatched legacy systems remain vulnerable to potential future exploitation or accidental crashes caused by benign software triggering the flaw.

Mitigation Recommendations

To mitigate the risk posed by CVE-2026-21525, organizations should prioritize upgrading or migrating systems from Windows 10 Version 1607 to a supported and updated Windows version that includes security fixes. Where upgrading is not immediately feasible, organizations should restrict local access to affected systems by enforcing strict physical and logical access controls, including limiting user accounts and applying the principle of least privilege. Monitoring and alerting for unexpected crashes or service interruptions of the Remote Access Connection Manager can help detect exploitation attempts or instability caused by this vulnerability. Network segmentation and endpoint protection solutions can reduce the likelihood of attackers gaining local access. Additionally, organizations should stay informed about official patches or workarounds released by Microsoft and apply them promptly once available. Implementing robust backup and recovery procedures ensures rapid restoration of services if a denial of service occurs. Finally, educating users and administrators about the risks of running unsupported legacy operating systems can help reduce exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-12-30T18:10:54.846Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698b76064b57a58fa120a6a1

Added to database: 2/10/2026, 6:16:38 PM

Last enriched: 3/27/2026, 10:01:33 PM

Last updated: 4/3/2026, 9:24:03 PM

Views: 161

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses