Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24296: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Microsoft Windows 10 Version 1607

0
High
VulnerabilityCVE-2026-24296cvecve-2026-24296cwe-362
Published: Tue Mar 10 2026 (03/10/2026, 17:04:46 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1607

Description

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Device Association Service allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 03/10/2026, 18:41:54 UTC

Technical Analysis

CVE-2026-24296 is a race condition vulnerability classified under CWE-362, affecting the Windows Device Association Service in Microsoft Windows 10 Version 1607 (build 10.0.14393.0). The flaw arises from improper synchronization when multiple threads concurrently access shared resources, leading to a race condition that can be exploited by an authorized local attacker to elevate privileges. Specifically, the attacker can manipulate the timing of operations within the Device Association Service to gain higher privileges than intended, potentially achieving SYSTEM-level access. The vulnerability requires the attacker to have local access with limited privileges but does not require user interaction, making it a potent vector for privilege escalation within compromised or multi-user environments. The CVSS v3.1 base score is 7.0, reflecting high severity due to the impact on confidentiality, integrity, and availability, combined with high attack complexity and the need for local privileges. No public exploits or patches are currently available, indicating that organizations must rely on mitigation strategies until an official fix is released. This vulnerability primarily affects legacy Windows 10 systems, which remain in use in various enterprise and industrial environments. The race condition nature of the flaw means that exploitation may be non-deterministic and timing-dependent, complicating detection and remediation efforts.

Potential Impact

If exploited, this vulnerability allows an attacker with limited local privileges to escalate their rights to SYSTEM or equivalent, enabling full control over the affected system. This can lead to unauthorized access to sensitive data, installation of persistent malware, disabling of security controls, and disruption of system availability. In multi-user environments, this could facilitate lateral movement and privilege escalation chains, significantly increasing the attack surface. Organizations relying on Windows 10 Version 1607, especially those in critical infrastructure, manufacturing, or legacy application environments, face increased risk of compromise. The lack of known exploits in the wild currently limits immediate widespread impact, but the potential for severe damage remains high if attackers develop reliable exploit techniques. The vulnerability also poses compliance and regulatory risks if exploited to access or alter protected data.

Mitigation Recommendations

Until an official patch is released, organizations should implement strict local access controls to limit the number of users with any level of local privileges on affected Windows 10 Version 1607 systems. Employ application whitelisting and endpoint detection and response (EDR) solutions to monitor for suspicious activities related to the Device Association Service. Disable or restrict the Device Association Service if it is not essential for business operations. Conduct regular audits of user permissions and remove unnecessary local accounts. Employ system hardening best practices, including disabling legacy or unused services and enforcing least privilege principles. Where feasible, upgrade affected systems to a supported and patched version of Windows to eliminate exposure. Network segmentation can help contain potential exploitation within limited environments. Additionally, monitor security advisories from Microsoft for forthcoming patches and apply them promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2026-01-21T21:28:02.969Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b0562cea502d3aa87d69d3

Added to database: 3/10/2026, 5:34:36 PM

Last enriched: 3/10/2026, 6:41:54 PM

Last updated: 3/14/2026, 1:52:45 AM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses