SB20260414168 - Multiple vulnerabilities in Microsoft Windows Shell
Published: April 14, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Use-after-free (CVE-ID: CVE-2026-26165)
The vulnerability allows a local user to compromise vulnerable system.
The vulnerability exists due to a use-after-free error in Windows Shell. A local user can win a race condition and gain elevated privileges on the target system.
2) Protection Mechanism Failure (CVE-ID: CVE-2026-32225)
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to insufficient implementation of security measures in Windows Shell. A remote attacker can trick a victim to open a specially crafted file and execute arbitrary code on the system.
3) Information disclosure (CVE-ID: CVE-2026-32151)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in Windows Shell. A remote user can gain unauthorized access to sensitive information on the system.
4) Protection Mechanism Failure (CVE-ID: CVE-2026-32202)
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to insufficient implementation of security measures in Windows Shell. A remote attacker can bypass implemented security restrictions and view some sensitive information.
5) Race condition (CVE-ID: CVE-2026-27918)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition in Windows Shell. A local user can exploit the race and escalate privileges on the system.
6) Double free (CVE-ID: CVE-2026-26166)
The vulnerability allows a local user to compromise the target system.
The vulnerability exists due to a boundary error in Windows Shell. A local user can win a race condition and gain elevated privileges on the system.
Remediation
Install update from vendor's website.
References
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26165
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32225
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32151
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32202
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27918
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26166