Elevation of Privilege Vulnerability in Windows Accessibility Infrastructure by Microsoft
CVE-2026-24291
Key Information:
- Vendor
Microsoft
- Vendor
- CVE Published:
- 10 March 2026
Badges
What is CVE-2026-24291?
CVE-2026-24291 is an elevation of privilege vulnerability affecting the Windows Accessibility Infrastructure, specifically associated with the ATBroker executable. This vulnerability arises from incorrect permission assignments for a critical resource within the system, enabling an authorized user to gain elevated privileges locally. Such a flaw can be detrimental to organizations, as it may allow malicious actors, who already have some level of access, to escalate their permissions and manipulate system settings or data beyond their intended access levels. This poses a significant security risk, particularly in environments where administrative controls are crucial for safeguarding sensitive information and maintaining system integrity.
Potential impact of CVE-2026-24291
-
Local Privilege Escalation: Attackers with limited access can exploit this vulnerability to elevate their privileges, potentially gaining administrative rights. This could allow them to execute arbitrary code, modify system configurations, or access sensitive data.
-
Compromise of Sensitive Information: With elevated permissions, an attacker could exfiltrate confidential information, manipulate financial records, or engage in identity theft, significantly impacting organizational trust and financial stability.
-
Increased Attack Surface for Malware: This vulnerability can serve as a gateway for further attacks within an organization's network. Once an attacker gains elevated privileges, they could deploy additional malware, including ransomware, jeopardizing the integrity of critical systems and data.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Windows 10 Version 1607 32-bit Systems 10.0.14393.0 < 10.0.14393.8957
Windows 10 Version 1809 32-bit Systems 10.0.17763.0 < 10.0.17763.8511
Windows 10 Version 21H2 32-bit Systems 10.0.19044.0 < 10.0.19044.7058
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved