8.7
CVE-2026-27928
- EPSS 0.17%
- Veröffentlicht 14.04.2026 16:58:13
- Zuletzt bearbeitet 22.04.2026 17:36:40
- Quelle secure@microsoft.com
- CVE-Watchlists
- Unerledigt
Windows Hello Security Feature Bypass Vulnerability
Improper input validation in Windows Hello allows an unauthorized attacker to bypass a security feature over a network.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Microsoft ≫ Windows Server 2016 Version < 10.0.14393.9060
Microsoft ≫ Windows Server 2019 Version < 10.0.17763.8644
Microsoft ≫ Windows Server 2022 Version < 10.0.20348.5020
Microsoft ≫ Windows Server 2022 23h2 Version < 10.0.25398.2274
Microsoft ≫ Windows Server 2025 Version < 10.0.26100.32690
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.17% | 0.377 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| secure@microsoft.com | 8.7 | 2.2 | 5.8 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.