High Severity Vulnerability
This vulnerability has been rated as High severity. Immediate action is recommended.
CVE-2026-20815
HighVulnerability Description
Concurrent execution using shared resource with improper synchronization ('race condition') in Capability Access Management Service (camsvc) allows an authorized attacker to elevate privileges locally.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Known Affected Software
55 configuration(s) from 1 vendor(s)
cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.7623:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.6563:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.4652:*:*:*:-:*:x64:*
cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.6899:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.4061:*:*:*:-:*:x64:*
cpe:2.3:o:microsoft:windows_11_24h2:10.0.26100.3981:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_24h2:10.0.26100.4061:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.3194:*:*:*:-:*:x64:*
cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.6508:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_25h2:10.0.26200.7171:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_24h2:10.0.26100.3403:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_24h2:10.0.26100.7171:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.2314:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_24h2:10.0.26100.4851:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_24h2:10.0.26100.2314:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.4270:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.3981:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.2605:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_24h2:10.0.26100.4270:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_24h2:10.0.26100.2033:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.2033:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_24h2:10.0.26100.6899:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_24h2:10.0.26100.2454:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.3775:*:*:*:-:*:x64:*
cpe:2.3:o:microsoft:windows_11_24h2:10.0.26100.4652:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.3781:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_25h2:10.0.26200.7092:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_24h2:10.0.26100.6508:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.4946:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.4066:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_24h2:10.0.26100.1742:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_24h2:10.0.26100.3476:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_24h2:10.0.26100.2161:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.7092:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_24h2:10.0.26100.3775:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.4656:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_24h2:10.0.26100.2894:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.4851:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_24h2:10.0.26100.4349:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_24h2:10.0.26100.3194:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_24h2:10.0.26100.3107:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.3403:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.6584:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_24h2:10.0.26100.6584:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.3107:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.3476:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.7171:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_24h2:10.0.26100.7092:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.6905:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_25h2:10.0.26200.6899:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_11_24h2:10.0.26100.2605:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_24h2:10.0.26100.4946:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_11_24h2:10.0.26100.6563:*:*:*:*:*:arm64:*
cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.2894:*:*:*:-:*:x64:*
cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.4349:*:*:*:*:*:x64:*
Severity Details
Weakness Type (CWE)
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
- Description
- The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
- Exploit Likelihood
- Medium
- Typical Severity
- High
- Abstraction Level
- Class
Key Information
- Published Date
- January 13, 2026
External Resources
Related News Articles
Latest news and updates about CVE-2026-20815
