CVE-2026-32077
Published: 14 April 2026
Summary
CVE-2026-32077 is a high-severity Untrusted Pointer Dereference (CWE-822) vulnerability in Microsoft Windows 10 21H2. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 15.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Timely flaw remediation through vendor patching directly fixes the untrusted pointer dereference in Windows UPnP Device Host.
Memory protection mechanisms like ASLR, DEP, and stack canaries prevent successful exploitation of untrusted pointer dereference vulnerabilities.
Least functionality restricts or disables unnecessary UPnP Device Host capabilities to eliminate the vulnerable attack surface.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Local untrusted pointer dereference in UPnP Device Host directly enables privilege escalation from low to higher privileges on Windows (T1068).
NVD Description
Untrusted pointer dereference in Windows Universal Plug and Play (UPnP) Device Host allows an authorized attacker to elevate privileges locally.
Deeper analysisAI
CVE-2026-32077 is an untrusted pointer dereference vulnerability, classified under CWE-822, in the Windows Universal Plug and Play (UPnP) Device Host. This flaw affects Windows operating systems where the UPnP Device Host component is present. It carries a CVSS v3.1 base score of 7.8, reflecting high severity with attack vector local (AV:L), low attack complexity (AC:L), low privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability was published on 2026-04-14T18:17:09.690.
A local authorized attacker with low privileges can exploit this vulnerability to elevate privileges on the affected system. The attack requires only local access and is straightforward in execution, without needing user interaction, enabling the attacker to gain higher-level access and potentially compromise the confidentiality, integrity, and availability of the system.
For mitigation details, refer to the Microsoft Security Update Guide at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32077.
Details
- CWE(s)