Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24291: CWE-732: Incorrect Permission Assignment for Critical Resource in Microsoft Windows 10 Version 1607

0
High
VulnerabilityCVE-2026-24291cvecve-2026-24291cwe-732
Published: Tue Mar 10 2026 (03/10/2026, 17:04:43 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1607

Description

Incorrect permission assignment for critical resource in Windows Accessibility Infrastructure (ATBroker.exe) allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 03/10/2026, 18:40:15 UTC

Technical Analysis

CVE-2026-24291 is a vulnerability classified under CWE-732 (Incorrect Permission Assignment for Critical Resource) affecting Microsoft Windows 10 Version 1607 (build 10.0.14393.0). The flaw resides in the Windows Accessibility Infrastructure component, specifically in the ATBroker.exe process, which manages accessibility features. Due to improper permission settings on critical resources, an authorized local attacker can exploit this vulnerability to elevate their privileges on the affected system. The attacker does not require user interaction to exploit this issue, and the attack complexity is low, as indicated by the CVSS vector (AV:L/AC:L/PR:L/UI:N). The vulnerability impacts confidentiality, integrity, and availability at a high level, allowing attackers to gain higher privileges, potentially leading to full system compromise. Although no public exploits are currently known, the vulnerability is rated with a CVSS 3.1 base score of 7.8 (high severity), reflecting its significant risk. The vulnerability was reserved in January 2026 and published in March 2026. No official patches or mitigations have been linked yet, so organizations must rely on compensating controls until updates are available.

Potential Impact

The vulnerability allows local attackers with authorized access to escalate privileges, potentially gaining SYSTEM-level rights. This can lead to unauthorized access to sensitive data, modification or deletion of critical system files, installation of persistent malware, and disruption of system availability. In enterprise environments, exploitation could facilitate lateral movement, undermining network security and increasing the risk of widespread compromise. The lack of required user interaction and low attack complexity increase the likelihood of exploitation in environments where legacy Windows 10 Version 1607 systems remain in use. Organizations that have not upgraded or patched these systems face elevated risks, especially those with multiple users having local access. The impact extends to confidentiality, integrity, and availability, making this a critical concern for information security and operational continuity.

Mitigation Recommendations

1. Apply official patches or security updates from Microsoft as soon as they become available for Windows 10 Version 1607. 2. Restrict local user permissions to the minimum necessary, enforcing the principle of least privilege to reduce the pool of users who can exploit the vulnerability. 3. Limit local access to systems running the affected Windows version, especially in shared or multi-user environments. 4. Monitor and audit usage of ATBroker.exe and related accessibility infrastructure components for unusual or unauthorized activity. 5. Employ application whitelisting and endpoint detection and response (EDR) tools to detect and block suspicious privilege escalation attempts. 6. Consider upgrading affected systems to a more recent, supported Windows version where this vulnerability is not present. 7. Implement network segmentation to contain potential lateral movement if exploitation occurs. 8. Educate system administrators and users about the risks of local privilege escalation and the importance of timely patching.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2026-01-21T21:28:02.968Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b0562aea502d3aa87d6981

Added to database: 3/10/2026, 5:34:34 PM

Last enriched: 3/10/2026, 6:40:15 PM

Last updated: 3/13/2026, 3:57:18 PM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses