Cyber Posture

CVE-2026-32162

High

Published: 14 April 2026

Published
14 April 2026
Modified
20 April 2026
KEV Added
Patch
CVSS Score 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0004 11.4th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-32162 is a high-severity Acceptance of Extraneous Untrusted Data With Trusted Data (CWE-349) vulnerability in Microsoft Windows 10 21H2. Its CVSS base score is 8.4 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 11.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Flaw remediation directly mitigates CVE-2026-32162 by applying Microsoft patches to fix the extraneous untrusted data acceptance in Windows COM.

prevent

Information input validation prevents acceptance of extraneous untrusted data with trusted data in Windows COM, blocking the privilege escalation vector.

prevent

Least privilege limits the impact of successful local privilege escalation from unprivileged attackers exploiting the COM vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Local privilege escalation vulnerability in Windows COM directly enables T1068 (Exploitation for Privilege Escalation) with no privileges or user interaction required.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Acceptance of extraneous untrusted data with trusted data in Windows COM allows an unauthorized attacker to elevate privileges locally.

Deeper analysisAI

CVE-2026-32162 is a high-severity vulnerability (CVSS 8.4, CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) involving the acceptance of extraneous untrusted data alongside trusted data in Windows COM, mapped to CWE-349 (Acceptance of Extraneous Untrusted Data with Trusted Data). It affects the Windows Component Object Model (COM), enabling local privilege escalation for unauthorized attackers. The vulnerability was published on 2026-04-14.

An unauthorized local attacker requires only local access to the system with no privileges (PR:N), low attack complexity (AC:L), and no user interaction (UI:N). Successful exploitation allows the attacker to achieve high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), specifically elevating privileges on the affected Windows system.

Microsoft's update guide at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32162 provides details on patches and mitigation recommendations for this vulnerability.

Details

CWE(s)

Affected Products

microsoft
windows 10 1809
≤ 10.0.17763.8644 · ≤ 10.0.17763.8644
microsoft
windows 10 21h2
≤ 10.0.19044.7184 · ≤ 10.0.19044.7184 · ≤ 10.0.19044.7184
microsoft
windows 10 22h2
≤ 10.0.19045.7184 · ≤ 10.0.19045.7184 · ≤ 10.0.19045.7184
microsoft
windows 11 23h2
≤ 10.0.22631.6936 · ≤ 10.0.22631.6936
microsoft
windows 11 24h2
≤ 10.0.26100.8246 · ≤ 10.0.26100.8246
microsoft
windows 11 25h2
≤ 10.0.26200.8246 · ≤ 10.0.26200.8246
microsoft
windows 11 26h1
≤ 10.0.28000.1836 · ≤ 10.0.28000.1836
microsoft
windows server 2019
≤ 10.0.17763.8644
microsoft
windows server 2022
≤ 10.0.20348.5020
microsoft
windows server 2022 23h2
≤ 10.0.25398.2274
+1 more product configuration(s) — see NVD for full list

CVEs Like This One

CVE-2026-27927Same product: Microsoft Windows 10 1809
CVE-2026-32074Same product: Microsoft Windows 10 1809
CVE-2026-32078Same product: Microsoft Windows 10 1809
CVE-2026-32160Same product: Microsoft Windows 10 1809
CVE-2026-32165Same product: Microsoft Windows 10 1809
CVE-2026-26161Same product: Microsoft Windows 10 1809
CVE-2026-26184Same product: Microsoft Windows 10 1809
CVE-2026-27918Same product: Microsoft Windows 10 1809
CVE-2026-32163Same product: Microsoft Windows 10 1809
CVE-2026-24292Same product: Microsoft Windows 10 1809

References