Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2976 articles · 110847 vulns · 36/41 feeds (7d)
← Back to list
7.0
CVE-2026-27929EXPLOITEDPATCHED
Microsoft · Windows 10 Version 1607

Windows LUA File Virtualization Filter Driver Elevation of Privilege Vulnerability

Description

Time-of-check time-of-use (toctou) race condition in Windows LUAFV allows an authorized attacker to elevate privileges locally.

Affected Products

VendorProductVersions
MicrosoftWindows 10 Version 160710.0.14393.0, 10.0.17763.0, 10.0.19044.0, 10.0.19045.0, 10.0.22631.0, 10.0.22631.0, 10.0.26100.0, 10.0.26200.0, 10.0.28000.0, 6.2.9200.0, 6.2.9200.0, 6.3.9600.0, 6.3.9600.0, 10.0.14393.0, 10.0.14393.0, 10.0.17763.0, 10.0.17763.0, 10.0.20348.0, 10.0.25398.0, 10.0.26100.0, 10.0.26100.0

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
microsoftwindowsmitre_affected90%
microsoftwindows server 2022, 23h2 edition (server core installation)mitre_affected90%
microsoftwindows 10 version 21h2mitre_affected90%
microsoftwindows server 2012 r2mitre_affected90%
microsoftwindows server 2025 (server core installation)mitre_affected90%

References

  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27929(vendor-advisory, patch)

Related News (2 articles)

Tier C
VulDB5h ago
CVE-2026-27929 | Microsoft Windows up to Server 2025 toctou
→ No new info (linked only)
Tier A
Microsoft MSRC9h ago
CVE-2026-27929 Windows LUA File Virtualization Filter Driver Elevation of Privilege Vulnerability
→ No new info (linked only)
CVSS 3.17.0 HIGH
VectorCVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
10.0.14393.906010.0.17763.864410.0.19044.718410.0.19045.718410.0.22631.693610.0.26100.3269010.0.26200.824610.0.28000.18366.2.9200.260266.3.9600.2313210.0.20348.502010.0.25398.2274
CWECWE-367
PublishedApr 14, 2026
Last enriched5h agov3
Tags
CVE-2026-27929
Trending Score57
Source articles2
Independent2
Info Completeness10/14
Missing: epss, kev, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-32201EXPKEV
Microsoft SharePoint Server Spoofing Vulnerability
Trending: 151
HIGHCVE-2026-26171EXP
.NET Denial of Service Vulnerability
Trending: 71
HIGHCVE-2026-32071EXP
Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability
Trending: 67
HIGHCVE-2026-32093EXP
Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability
Trending: 67
HIGHCVE-2026-32075EXP
Windows UPnP Device Host Elevation of Privilege Vulnerability
Trending: 67

Pin to Dashboard

Verification

State: verified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 14, 2026
Discovered by ZDM
Apr 14, 2026
Updated: description, exploitAvailable, activelyExploited
Apr 14, 2026
Actively Exploited
Apr 14, 2026
Exploit Available
Apr 14, 2026
Patch Available
Apr 14, 2026
Updated: tags
Apr 14, 2026

Version History

v3
Last enriched 5h ago
v3Tier C5h ago

Updated severity to CRITICAL and added new CVE ID CVE-2026-27929.

tags
via VulDB
v2Tier A5h ago

Added a detailed description of the vulnerability and marked it as actively exploited with an exploit available.

descriptionexploitAvailableactivelyExploited
via Microsoft MSRC
v15h ago

Initial creation