CVE-2026-24297
Received
Received - Intake
Race Condition in Windows Kerberos Enables Remote Security Bypass
Publication date: 2026-03-10
Last updated on: 2026-03-13
Assigner: Microsoft Corporation
Description
Description
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Kerberos allows an unauthorized attacker to bypass a security feature over a network.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| microsoft | windows_server_2012 | r2 |
| microsoft | windows_server_2012 | * |
| microsoft | windows_10_1809 | to 10.0.17763.8511 (exc) |
| microsoft | windows_10_1809 | to 10.0.17763.8511 (exc) |
| microsoft | windows_10_21h2 | to 10.0.19044.7058 (exc) |
| microsoft | windows_10_21h2 | to 10.0.19044.7058 (exc) |
| microsoft | windows_10_21h2 | to 10.0.19044.7058 (exc) |
| microsoft | windows_10_22h2 | to 10.0.19045.7058 (exc) |
| microsoft | windows_10_22h2 | to 10.0.19045.7058 (exc) |
| microsoft | windows_10_22h2 | to 10.0.19045.7058 (exc) |
| microsoft | windows_server_2016 | to 10.0.14393.8957 (exc) |
| microsoft | windows_server_2019 | to 10.0.17763.8511 (exc) |
| microsoft | windows_10_1607 | to 10.0.14393.8957 (exc) |
| microsoft | windows_10_1607 | to 10.0.14393.8957 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-362 | The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a race condition in Windows Kerberos where concurrent execution using a shared resource occurs without proper synchronization. This flaw allows an unauthorized attacker to bypass a security feature over a network.
How can this vulnerability impact me? :
The vulnerability can allow an unauthorized attacker to bypass security features in Windows Kerberos remotely. This could lead to unauthorized access or actions that compromise the confidentiality and integrity of your system or network.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70