CVE-2026-20941
Published: 13 January 2026
Summary
CVE-2026-20941 is a high-severity Link Following (CWE-59) vulnerability in Microsoft Windows 11 24H2. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 12.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the improper link resolution vulnerability in the Host Process for Windows Tasks through timely application of vendor patches.
Enforces least privilege on users and processes to limit the ability of low-privileged local attackers to create exploitable symbolic links or the impact of successful escalation.
Establishes secure configuration settings for the Windows operating system to harden against symlink following vulnerabilities in task host processes.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct local privilege escalation via improper symlink resolution (CWE-59) in a Windows system process.
NVD Description
Improper link resolution before file access ('link following') in Host Process for Windows Tasks allows an authorized attacker to elevate privileges locally.
Deeper analysisAI
CVE-2026-20941 is an improper link resolution before file access vulnerability, commonly referred to as "link following," affecting the Host Process for Windows Tasks in Microsoft Windows operating systems. This issue, mapped to CWE-59, enables an authorized attacker to elevate privileges locally and was published on 2026-01-13T18:16:21.530 with a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact on confidentiality, integrity, and availability.
The vulnerability can be exploited by a local attacker who already has low-level privileges on the system (PR:L). Exploitation requires low attack complexity (AC:L) and no user interaction (UI:N), allowing the attacker to follow symbolic links improperly before file access in the Host Process for Windows Tasks, resulting in local privilege escalation.
Mitigation details are available in the Microsoft Security Response Center update guide at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20941.
Details
- CWE(s)