BDU:2026-01800

Vulnerability from fstec - Published: 10.02.2026
VLAI Severity ?
Title
Уязвимость ядра операционных систем Windows, позволяющая нарушителю повысить свои привилегии
Description
Уязвимость ядра операционных систем Windows связана с ошибками синхронизации при использовании общего ресурса. Эксплуатация уязвимости может позволить нарушителю повысить свои привилегии
Vendor
Microsoft Corp
Software Name
Windows 11 26H1, Windows Server 2012 R2 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 (Server Core installation), Windows Server 2012, Windows Server 2016 (Server Core installation), Windows Server 2016, Windows 10 1607, Windows Server 2025, Windows 11 24H2, Windows Server 2022, 23H2 Edition (Server Core installation), Windows 11 23H2, Windows Server 2025 (Server Core installation), Windows 10 22H2, Windows 10 21H2, Windows Server 2022 (Server Core installation), Windows Server 2022, Windows Server 2019 (Server Core installation), Windows Server 2019, Windows 10 1809, Windows 11 25H2
Software Version
до 10.0.28000.1575 (Windows 11 26H1), до 6.3.9600.23022 (Windows Server 2012 R2 (Server Core installation)), до 6.3.9600.23022 (Windows Server 2012 R2), до 6.2.9200.25923 (Windows Server 2012 (Server Core installation)), до 6.2.9200.25923 (Windows Server 2012), до 10.0.14393.8868 (Windows Server 2016 (Server Core installation)), до 10.0.14393.8868 (Windows Server 2016), до 10.0.14393.8868 (Windows 10 1607), до 10.0.26100.32370 (Windows Server 2025), до 10.0.26100.32313 (Windows Server 2025), до 10.0.26100.7840 (Windows 11 24H2), до 10.0.26100.7781 (Windows 11 24H2), до 10.0.25398.2149 (Windows Server 2022, 23H2 Edition (Server Core installation)), до 10.0.22631.6649 (Windows 11 23H2), до 10.0.26100.32370 (Windows Server 2025 (Server Core installation)), до 10.0.26100.32313 (Windows Server 2025 (Server Core installation)), до 10.0.19045.6937 (Windows 10 22H2), до 10.0.19044.6937 (Windows 10 21H2), до 10.0.20348.4773 (Windows Server 2022 (Server Core installation)), до 10.0.20348.4711 (Windows Server 2022 (Server Core installation)), до 10.0.20348.4773 (Windows Server 2022), до 10.0.20348.4711 (Windows Server 2022), до 10.0.17763.8389 (Windows Server 2019 (Server Core installation)), до 10.0.17763.8389 (Windows Server 2019), до 10.0.17763.8389 (Windows 10 1809), до 10.0.26100.7840 (Windows 11 25H2), до 10.0.26100.7781 (Windows 11 25H2)
Possible Mitigations
Использование рекомендаций производителя: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21231
Reference
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21231
CWE
CWE-362

{
  "CVSS 2.0": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
  "CVSS 3.0": "AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
  "CVSS 4.0": null,
  "remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
  "remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
  "\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Microsoft Corp",
  "\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u0434\u043e 10.0.28000.1575 (Windows 11 26H1), \u0434\u043e 6.3.9600.23022 (Windows Server 2012 R2 (Server Core installation)), \u0434\u043e 6.3.9600.23022 (Windows Server 2012 R2), \u0434\u043e 6.2.9200.25923 (Windows Server 2012 (Server Core installation)), \u0434\u043e 6.2.9200.25923 (Windows Server 2012), \u0434\u043e 10.0.14393.8868 (Windows Server 2016 (Server Core installation)), \u0434\u043e 10.0.14393.8868 (Windows Server 2016), \u0434\u043e 10.0.14393.8868 (Windows 10 1607), \u0434\u043e 10.0.26100.32370 (Windows Server 2025), \u0434\u043e 10.0.26100.32313 (Windows Server 2025), \u0434\u043e 10.0.26100.7840 (Windows 11 24H2), \u0434\u043e 10.0.26100.7781 (Windows 11 24H2), \u0434\u043e 10.0.25398.2149 (Windows Server 2022, 23H2 Edition (Server Core installation)), \u0434\u043e 10.0.22631.6649 (Windows 11 23H2), \u0434\u043e 10.0.26100.32370 (Windows Server 2025 (Server Core installation)), \u0434\u043e 10.0.26100.32313 (Windows Server 2025 (Server Core installation)), \u0434\u043e 10.0.19045.6937 (Windows 10 22H2), \u0434\u043e 10.0.19044.6937 (Windows 10 21H2), \u0434\u043e 10.0.20348.4773 (Windows Server 2022 (Server Core installation)), \u0434\u043e 10.0.20348.4711 (Windows Server 2022 (Server Core installation)), \u0434\u043e 10.0.20348.4773 (Windows Server 2022), \u0434\u043e 10.0.20348.4711 (Windows Server 2022), \u0434\u043e 10.0.17763.8389 (Windows Server 2019 (Server Core installation)), \u0434\u043e 10.0.17763.8389 (Windows Server 2019), \u0434\u043e 10.0.17763.8389 (Windows 10 1809), \u0434\u043e 10.0.26100.7840 (Windows 11 25H2), \u0434\u043e 10.0.26100.7781 (Windows 11 25H2)",
  "\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21231",
  "\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "10.02.2026",
  "\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "16.02.2026",
  "\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "16.02.2026",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2026-01800",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2026-21231",
  "\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
  "\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
  "\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Windows 11 26H1, Windows Server 2012 R2 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 (Server Core installation), Windows Server 2012, Windows Server 2016 (Server Core installation), Windows Server 2016, Windows 10 1607, Windows Server 2025, Windows 11 24H2, Windows Server 2022, 23H2 Edition (Server Core installation), Windows 11 23H2, Windows Server 2025 (Server Core installation), Windows 10 22H2, Windows 10 21H2, Windows Server 2022 (Server Core installation), Windows Server 2022, Windows Server 2019 (Server Core installation), Windows Server 2019, Windows 10 1809, Windows 11 25H2",
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Microsoft Corp Windows 11 26H1 \u0434\u043e 10.0.28000.1575 64-bit, Microsoft Corp Windows 11 26H1 \u0434\u043e 10.0.28000.1575 ARM64, Microsoft Corp Windows Server 2012 R2 (Server Core installation) \u0434\u043e 6.3.9600.23022 , Microsoft Corp Windows Server 2012 R2 \u0434\u043e 6.3.9600.23022 , Microsoft Corp Windows Server 2012 (Server Core installation) \u0434\u043e 6.2.9200.25923 , Microsoft Corp Windows Server 2012 \u0434\u043e 6.2.9200.25923 , Microsoft Corp Windows Server 2016 (Server Core installation) \u0434\u043e 10.0.14393.8868 , Microsoft Corp Windows Server 2016 \u0434\u043e 10.0.14393.8868 , Microsoft Corp Windows 10 1607 \u0434\u043e 10.0.14393.8868 64-bit, Microsoft Corp Windows 10 1607 \u0434\u043e 10.0.14393.8868 32-bit, Microsoft Corp Windows Server 2025 \u0434\u043e 10.0.26100.32370 , Microsoft Corp Windows Server 2025 \u0434\u043e 10.0.26100.32313 , Microsoft Corp Windows 11 24H2 \u0434\u043e 10.0.26100.7840 64-bit, Microsoft Corp Windows 11 24H2 \u0434\u043e 10.0.26100.7781 64-bit, Microsoft Corp Windows 11 24H2 \u0434\u043e 10.0.26100.7840 ARM64, Microsoft Corp Windows 11 24H2 \u0434\u043e 10.0.26100.7781 ARM64, Microsoft Corp Windows Server 2022, 23H2 Edition (Server Core installation) \u0434\u043e 10.0.25398.2149 , Microsoft Corp Windows 11 23H2 \u0434\u043e 10.0.22631.6649 64-bit, Microsoft Corp Windows 11 23H2 \u0434\u043e 10.0.22631.6649 ARM64, Microsoft Corp Windows Server 2025 (Server Core installation) \u0434\u043e 10.0.26100.32370 , Microsoft Corp Windows Server 2025 (Server Core installation) \u0434\u043e 10.0.26100.32313 , Microsoft Corp Windows 10 22H2 \u0434\u043e 10.0.19045.6937 32-bit, Microsoft Corp Windows 10 22H2 \u0434\u043e 10.0.19045.6937 ARM64, Microsoft Corp Windows 10 22H2 \u0434\u043e 10.0.19045.6937 64-bit, Microsoft Corp Windows 10 21H2 \u0434\u043e 10.0.19044.6937 64-bit, Microsoft Corp Windows 10 21H2 \u0434\u043e 10.0.19044.6937 ARM64, Microsoft Corp Windows 10 21H2 \u0434\u043e 10.0.19044.6937 32-bit, Microsoft Corp Windows Server 2022 (Server Core installation) \u0434\u043e 10.0.20348.4773 , Microsoft Corp Windows Server 2022 (Server Core installation) \u0434\u043e 10.0.20348.4711 , Microsoft Corp Windows Server 2022 \u0434\u043e 10.0.20348.4773 , Microsoft Corp Windows Server 2022 \u0434\u043e 10.0.20348.4711 , Microsoft Corp Windows Server 2019 (Server Core installation) \u0434\u043e 10.0.17763.8389 , Microsoft Corp Windows Server 2019 \u0434\u043e 10.0.17763.8389 , Microsoft Corp Windows 10 1809 \u0434\u043e 10.0.17763.8389 64-bit, Microsoft Corp Windows 10 1809 \u0434\u043e 10.0.17763.8389 32-bit, Microsoft Corp Windows 11 25H2 \u0434\u043e 10.0.26100.7840 64-bit, Microsoft Corp Windows 11 25H2 \u0434\u043e 10.0.26100.7781 64-bit, Microsoft Corp Windows 11 25H2 \u0434\u043e 10.0.26100.7840 ARM64, Microsoft Corp Windows 11 25H2 \u0434\u043e 10.0.26100.7781 ARM64",
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c Windows, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438",
  "\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041e\u0434\u043d\u043e\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043e\u0431\u0449\u0435\u0433\u043e \u0440\u0435\u0441\u0443\u0440\u0441\u0430 \u0441 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0439 \u0441\u0438\u043d\u0445\u0440\u043e\u043d\u0438\u0437\u0430\u0446\u0438\u0435\u0439 (\u00ab\u0421\u0438\u0442\u0443\u0430\u0446\u0438\u044f \u0433\u043e\u043d\u043a\u0438\u00bb) (CWE-362)",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c Windows \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438 \u0441\u0438\u043d\u0445\u0440\u043e\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u0440\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438 \u043e\u0431\u0449\u0435\u0433\u043e \u0440\u0435\u0441\u0443\u0440\u0441\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438",
  "\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
  "\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
  "\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0440\u043e\u043a\u0430\u043c\u0438 \u0438 \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435\u043c",
  "\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21231",
  "\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
  "\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
  "\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-362",
  "\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,8)"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…