Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 17 Apr 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:microsoft:windows_11_26h1:*:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_11_26h1:*:*:*:*:*:*:x64:* |
Wed, 15 Apr 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft windows 11 26h1
|
|
| Vendors & Products |
Microsoft windows 11 26h1
|
Wed, 15 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 14 Apr 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Use after free in Windows Server Update Service allows an authorized attacker to elevate privileges locally. | |
| Title | Windows Server Update Service (WSUS) Elevation of Privilege Vulnerability | |
| First Time appeared |
Microsoft
Microsoft windows 11 26h1 |
|
| Weaknesses | CWE-416 | |
| CPEs | cpe:2.3:o:microsoft:windows_11_26H1:*:*:*:*:*:*:arm64:* | |
| Vendors & Products |
Microsoft
Microsoft windows 11 26h1 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: microsoft
Published:
Updated: 2026-05-12T17:38:39.337Z
Reserved: 2026-03-11T01:49:58.662Z
Link: CVE-2026-32224
Updated: 2026-04-15T09:09:04.853Z
Status : Analyzed
Published: 2026-04-14T18:17:30.690
Modified: 2026-04-17T19:35:06.320
Link: CVE-2026-32224
No data.
OpenCVE Enrichment
Updated: 2026-04-15T20:45:06Z