Heap-based Buffer Overflow in Windows TCP/IP by Microsoft
CVE-2026-33837

7.8HIGH

What is CVE-2026-33837?

A heap-based buffer overflow vulnerability in Windows TCP/IP can be exploited by an authorized attacker for local privilege escalation. By manipulating the TCP/IP stack, attackers may gain elevated access to system resources, potentially compromising sensitive data and system integrity. This vulnerability highlights the importance of applying security patches promptly to safeguard against exploitation.

Affected Version(s)

Windows 10 Version 1607 32-bit Systems 10.0.14393.0 < 10.0.14393.9140

Windows 10 Version 1809 32-bit Systems 10.0.17763.0 < 10.0.17763.8755

Windows 10 Version 21H2 32-bit Systems 10.0.19044.0 < 10.0.19044.7291

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.