Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2026-20876

Опубликовано: 13 янв. 2026
Источник: msrc
CVSS3: 6.7
EPSS Низкий

Описание

Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability

Heap-based buffer overflow in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to elevate privileges locally.

FAQ

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain Virtual Trust Level 2 (VTL2) privileges.

Обновления

ПродуктСтатьяОбновление
Windows 11 Version 23H2 for ARM64-based Systems
Windows 11 Version 23H2 for x64-based Systems
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows 11 Version 24H2 for ARM64-based Systems
Windows 11 Version 24H2 for x64-based Systems
Windows Server 2025
Windows Server 2025 (Server Core installation)
Windows 11 Version 25H2 for ARM64-based Systems
Windows 11 Version 25H2 for x64-based Systems

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

EPSS

Процентиль: 20%
0.00065
Низкий

6.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.7
nvd
21 день назад

Heap-based buffer overflow in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to elevate privileges locally.

CVSS3: 6.7
github
21 день назад

Heap-based buffer overflow in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to elevate privileges locally.

CVSS3: 6.7
fstec
22 дня назад

Уязвимость доверенной среды выполнения Virtualization-Based Security (VBS) Enclave операционных систем Windows, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 20%
0.00065
Низкий

6.7 Medium

CVSS3