CVE-2026-21235

HIGH
中文标题:
(暂无数据)
英文标题:
Windows Graphics Component Elevation of Privilege Vulnerability
CVSS分数: 7.3
发布时间: 2026-02-10 17:51:22
漏洞类型: (暂无数据)
状态: PUBLISHED
数据质量分数: 0.40
数据版本: v3
漏洞描述
中文描述:

(暂无数据)

英文描述:

NOT_EXTRACTED

CWE类型:
CWE-416
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
Microsoft Windows 10 Version 1809 - < 10.0.17763.8389 - cpe:2.3:a:microsoft:windows_10_version_1809:*:*:*:*:*:*:*:*
Microsoft Windows Server 2019 - < 10.0.17763.8389 - cpe:2.3:a:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
Microsoft Windows Server 2019 (Server Core installation) - < 10.0.17763.8389 - cpe:2.3:a:microsoft:windows_server_2019_(server_core_installation):*:*:*:*:*:*:*:*
Microsoft Windows Server 2022 - < 10.0.20348.4773 - cpe:2.3:a:microsoft:windows_server_2022:*:*:*:*:*:*:*:*
Microsoft Windows 10 Version 21H2 - < 10.0.19044.6937 - cpe:2.3:a:microsoft:windows_10_version_21h2:*:*:*:*:*:*:*:*
Microsoft Windows 10 Version 22H2 - < 10.0.19045.6937 - cpe:2.3:a:microsoft:windows_10_version_22h2:*:*:*:*:*:*:*:*
Microsoft Windows 11 version 22H3 - < 10.0.22631.6649 - cpe:2.3:a:microsoft:windows_11_version_22h3:*:*:*:*:*:*:*:*
Microsoft Windows 11 Version 23H2 - < 10.0.22631.6649 - cpe:2.3:a:microsoft:windows_11_version_23h2:*:*:*:*:*:*:*:*
Microsoft Windows 10 Version 1607 - < 10.0.14393.8868 - cpe:2.3:a:microsoft:windows_10_version_1607:*:*:*:*:*:*:*:*
Microsoft Windows Server 2016 - < 10.0.14393.8868 - cpe:2.3:a:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
Microsoft Windows Server 2016 (Server Core installation) - < 10.0.14393.8868 - cpe:2.3:a:microsoft:windows_server_2016_(server_core_installation):*:*:*:*:*:*:*:*
Microsoft Windows Server 2012 - < 6.2.9200.25923 - cpe:2.3:a:microsoft:windows_server_2012:*:*:*:*:*:*:*:*
Microsoft Windows Server 2012 (Server Core installation) - < 6.2.9200.25923 - cpe:2.3:a:microsoft:windows_server_2012_(server_core_installation):*:*:*:*:*:*:*:*
Microsoft Windows Server 2012 R2 - < 6.3.9600.23022 - cpe:2.3:a:microsoft:windows_server_2012_r2:*:*:*:*:*:*:*:*
Microsoft Windows Server 2012 R2 (Server Core installation) - < 6.3.9600.23022 - cpe:2.3:a:microsoft:windows_server_2012_r2_(server_core_installation):*:*:*:*:*:*:*:*
Microsoft Windows 11 version 26H1 - < 10.0.28000.1575 - cpe:2.3:a:microsoft:windows_11_version_26h1:*:*:*:*:*:*:*:*
Microsoft Windows 11 Version 26H1 - < 10.0.28000.1575 - cpe:2.3:a:microsoft:windows_11_version_26h1:*:*:*:*:*:*:*:*
microsoft windows_10_1607 * - - cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*
microsoft windows_10_1809 * - - cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*
microsoft windows_10_21h2 * - - cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*
microsoft windows_10_22h2 * - - cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*
microsoft windows_11_23h2 * - - cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*
microsoft windows_server_2012 - - - cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
microsoft windows_server_2012 r2 - - cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
microsoft windows_server_2016 * - - cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
microsoft windows_server_2019 * - - cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
microsoft windows_server_2022 * - - cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
Windows Graphics Component Elevation of Privilege Vulnerability vendor-advisory
cve.org
访问
CVSS评分详情
3.1 (cna)
HIGH
7.3
CVSS向量: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2026-02-10 17:51:22
修改时间:
2026-02-11 01:14:47
创建时间:
2026-02-11 06:00:04
更新时间:
2026-02-12 06:00:07
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2026-21235 2026-02-11 03:19:42 2026-02-10 22:00:04
NVD nvd_CVE-2026-21235 2026-02-11 02:00:04 2026-02-10 22:00:08
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN
安全公告
暂无安全公告信息
变更历史
v3 NVD
2026-02-12 06:00:07
affected_products_count: 17 → 27
查看详细变更
  • affected_products_count: 17 -> 27
v2 NVD
2026-02-11 06:00:08
data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • data_sources: ['cve'] -> ['cve', 'nvd']