Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2977 articles · 110847 vulns · 36/41 feeds (7d)
← Back to list
7.0
CVE-2026-32093EXPLOITEDPATCHED
Microsoft · Windows 10 Version 1607

Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability

Description

Concurrent execution using shared resource with improper synchronization ('race condition') in Function Discovery Service (fdwsd.dll) allows an authorized attacker to elevate privileges locally.

Affected Products

VendorProductVersions
MicrosoftWindows 10 Version 160710.0.14393.0, 10.0.17763.0, 10.0.19044.0, 10.0.19045.0, 10.0.22631.0, 10.0.22631.0, 10.0.26100.0, 10.0.26200.0, 10.0.28000.0, 6.2.9200.0, 6.2.9200.0, 6.3.9600.0, 6.3.9600.0, 10.0.14393.0, 10.0.14393.0, 10.0.17763.0, 10.0.17763.0, 10.0.20348.0, 10.0.25398.0, 10.0.26100.0, 10.0.26100.0

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
microsoftwindows 10 version 21h2mitre_affected90%
microsoftwindows server 2012 r2mitre_affected90%
microsoftwindows server 2025 (server core installation)mitre_affected90%
microsoftwindowsmitre_affected90%
microsoftwindows server 2022, 23h2 edition (server core installation)mitre_affected90%

References

  • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32093(vendor-advisory, patch)

Related News (3 articles)

Tier C
Qualys Blog2h ago
Microsoft and Adobe Patch Tuesday, April 2026 Security Update Review
→ No new info (linked only)
Tier C
VulDB4h ago
CVE-2026-32093 | Microsoft Windows up to Server 2025 Function Discovery Service fdwsd.dll race condition
→ No new info (linked only)
Tier A
Microsoft MSRC8h ago
CVE-2026-32093 Windows Function Discovery Service (fdwsd.dll) Elevation of Privilege Vulnerability
→ No new info (linked only)
CVSS 3.17.0 HIGH
VectorCVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
10.0.14393.906010.0.17763.864410.0.19044.718410.0.19045.718410.0.22631.693610.0.26100.3269010.0.26200.824610.0.28000.18366.2.9200.260266.3.9600.2313210.0.20348.502010.0.25398.2274
CWECWE-362, CWE-367, CWE-122
PublishedApr 14, 2026
Last enriched4h agov3
Tags
CVE-2026-32093
Trending Score67
Source articles3
Independent3
Info Completeness10/14
Missing: epss, kev, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-32201EXPKEV
Microsoft SharePoint Server Spoofing Vulnerability
Trending: 151
HIGHCVE-2026-26171EXP
.NET Denial of Service Vulnerability
Trending: 71
HIGHCVE-2026-32071EXP
Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability
Trending: 67
HIGHCVE-2026-32075EXP
Windows UPnP Device Host Elevation of Privilege Vulnerability
Trending: 67
HIGHCVE-2026-26154EXP
Windows Server Update Service (WSUS) Tampering Vulnerability
Trending: 67

Pin to Dashboard

Verification

State: verified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 14, 2026
Discovered by ZDM
Apr 14, 2026
Updated: description, exploitAvailable, activelyExploited
Apr 14, 2026
Updated: tags
Apr 14, 2026
Actively Exploited
Apr 14, 2026
Exploit Available
Apr 14, 2026
Patch Available
Apr 14, 2026

Version History

v3
Last enriched 4h ago
v3Tier C4h ago

Updated severity to CRITICAL and added new CVE ID CVE-2026-32093.

tags
via VulDB
v2Tier A5h ago

Added a detailed description of the vulnerability and marked it as actively exploited with an exploit available.

descriptionexploitAvailableactivelyExploited
via Microsoft MSRC
v15h ago

Initial creation