CVE-2026-40402

Microsoft · Windows Hyper-V

A use-after-free vulnerability in Windows Hyper-V allows an unauthorized attacker to elevate privileges on the local system.

Executive summary

A critical use-after-free vulnerability in Windows Hyper-V allows local attackers to achieve privilege escalation, potentially resulting in full system compromise.

Vulnerability

This is a use-after-free memory corruption issue within the Windows Hyper-V hypervisor. An unauthorized attacker can leverage this flaw to elevate their privileges to a higher level of system access.

Business impact

The ability to escalate privileges within a hypervisor environment is a significant security risk, as it may allow an attacker to escape the guest virtual machine and gain control over the host system. With a CVSS score of 9.3, this flaw threatens the integrity of virtualized workloads and the underlying host infrastructure.

Remediation

Immediate Action: Update the host operating system and Hyper-V components to the latest version provided by Microsoft.

Proactive Monitoring: Monitor host system logs for unexpected privilege escalation events or system crashes related to the hypervisor.

Compensating Controls: Restrict local user access on systems running Hyper-V to prevent non-privileged users from attempting to interact with the hypervisor interface.

Exploitation status

Public Exploit Available: Not specified

Analyst recommendation

Organizations utilizing virtualization should treat this update with high priority. Securing the hypervisor is essential to maintaining the isolation of virtual machines and preventing unauthorized escalation that could lead to host-level compromise.