Cyber Posture

CVE-2026-21255

HighLPE

Published: 10 February 2026

Published
10 February 2026
Modified
11 February 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0004 10.7th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-21255 is a high-severity Improper Access Control (CWE-284) vulnerability in Microsoft Windows 11 23H2. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 10.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-25 (Reference Monitor) and AC-3 (Access Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the improper access control flaw in Windows Hyper-V through timely application of vendor patches as detailed in Microsoft's update guide.

prevent

Implements a reference monitor for complete mediation of access decisions, tamper resistance, and verifiability, directly countering the access control bypass in Hyper-V.

prevent

Enforces approved authorizations for logical access to Hyper-V resources, addressing the core improper access control vulnerability exploited by local low-privilege attackers.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1611 Escape to Host Privilege Escalation
Adversaries may break out of a container or virtualized environment to gain access to the underlying host.
Why these techniques?

Improper access control in Hyper-V enables local privilege escalation (T1068) and guest-to-host escape (T1611) to fully compromise the hypervisor.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper access control in Windows Hyper-V allows an authorized attacker to bypass a security feature locally.

Deeper analysisAI

CVE-2026-21255 is an improper access control vulnerability (CWE-284) affecting Windows Hyper-V. Published on 2026-02-10, it enables an authorized attacker to bypass a security feature locally. The vulnerability has a CVSS v3.1 base score of 8.8 (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H), indicating high severity due to its potential for significant impact across confidentiality, integrity, and availability.

A local attacker with low privileges can exploit this vulnerability with low attack complexity and no user interaction required. Exploitation changes scope to high (S:C), allowing the attacker to achieve full control over the Hyper-V environment, potentially compromising the hypervisor and hosted virtual machines.

Microsoft's update guide at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21255 provides details on mitigation and available patches for addressing this vulnerability.

Details

CWE(s)

Affected Products

microsoft
windows 10 1607
≤ 10.0.14393.8868
microsoft
windows 10 1809
≤ 10.0.17763.8389
microsoft
windows 10 21h2
≤ 10.0.19044.6937
microsoft
windows 10 22h2
≤ 10.0.19045.6937
microsoft
windows 11 23h2
≤ 10.0.22631.6649 · ≤ 10.0.22631.6649
microsoft
windows 11 24h2
≤ 10.0.26100.7781 · ≤ 10.0.26100.7781
microsoft
windows 11 25h2
≤ 10.0.26200.7781 · ≤ 10.0.26200.7781
microsoft
windows server 2016
≤ 10.0.14393.8868
microsoft
windows server 2019
≤ 10.0.17763.8389
microsoft
windows server 2022
≤ 10.0.20348.4711
+2 more product configuration(s) — see NVD for full list

CVEs Like This One

CVE-2026-21238Same product: Microsoft Windows 10 1607
CVE-2026-27914Same product: Microsoft Windows 10 1607
CVE-2026-20843Same product: Microsoft Windows 10 1607
CVE-2026-25176Same product: Microsoft Windows 10 1607
CVE-2026-24290Same product: Microsoft Windows 10 1809
CVE-2025-59230Same product: Microsoft Windows 10 1607
CVE-2025-21293Same product: Microsoft Windows 10 1607
CVE-2025-21359Same product: Microsoft Windows 10 1607
CVE-2026-20929Same product: Microsoft Windows 10 1607
CVE-2026-20832Same product: Microsoft Windows 10 1607

References