Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24294: CWE-287: Improper Authentication in Microsoft Windows 10 Version 1607

0
High
VulnerabilityCVE-2026-24294cvecve-2026-24294cwe-287
Published: Tue Mar 10 2026 (03/10/2026, 17:04:45 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1607

Description

Improper authentication in Windows SMB Server allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 03/10/2026, 18:41:16 UTC

Technical Analysis

CVE-2026-24294 is a vulnerability identified in the Server Message Block (SMB) Server component of Microsoft Windows 10 Version 1607 (build 10.0.14393.0). The flaw is categorized under CWE-287, which pertains to improper authentication mechanisms. Specifically, the vulnerability allows an attacker who already has some level of authorized local access to bypass authentication controls within the SMB Server, thereby escalating their privileges on the affected system. The vulnerability does not require user interaction and can be exploited with low attack complexity, as indicated by the CVSS vector (AV:L/AC:L/PR:L/UI:N). The impact is severe, affecting confidentiality, integrity, and availability, potentially allowing full system compromise. Although no public exploits have been reported yet, the vulnerability's presence in a widely deployed legacy Windows version used in many enterprise environments makes it a significant concern. The lack of a patch link suggests that remediation is pending or that organizations must rely on mitigations until an official update is released. This vulnerability underscores the risks of running outdated Windows versions, especially those with extended support lifecycles, and highlights the importance of strict local access controls and monitoring of SMB services.

Potential Impact

The vulnerability allows an attacker with authorized local access to escalate privileges, potentially gaining SYSTEM-level control over the affected Windows 10 Version 1607 system. This can lead to unauthorized access to sensitive data, modification or deletion of critical files, and disruption of system availability. In enterprise environments, exploitation could facilitate lateral movement, persistence, and further compromise of networked systems. The impact is particularly critical in organizations that rely on legacy Windows 10 versions for operational continuity, such as industrial control systems, healthcare, and government agencies. The ability to elevate privileges without user interaction increases the risk of automated or stealthy attacks. Although no known exploits are currently in the wild, the vulnerability's characteristics make it a likely target for future exploitation, especially in environments where patching is delayed or unsupported.

Mitigation Recommendations

1. Immediately restrict local access to systems running Windows 10 Version 1607, especially limiting SMB Server access to trusted administrators only. 2. Implement strict network segmentation and access controls to minimize exposure of legacy systems. 3. Monitor SMB-related logs and local privilege escalation indicators for suspicious activity. 4. Plan and prioritize upgrading affected systems to a supported Windows version with ongoing security updates. 5. Until a patch is available, consider disabling SMB Server services on affected systems if operationally feasible. 6. Employ application whitelisting and endpoint detection and response (EDR) solutions to detect and block privilege escalation attempts. 7. Regularly audit user privileges and remove unnecessary local accounts to reduce attack surface. 8. Stay informed on updates from Microsoft regarding patches or workarounds for this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2026-01-21T21:28:02.968Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b0562aea502d3aa87d698a

Added to database: 3/10/2026, 5:34:34 PM

Last enriched: 3/10/2026, 6:41:16 PM

Last updated: 3/14/2026, 1:11:58 AM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses