May 2026: Win32k Elevation of Privilege Vulnerability
CVE-2026-34331 Published on May 12, 2026
Win32k Elevation of Privilege Vulnerability
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally.
Weakness Types
What is a Race Condition Vulnerability?
The program contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.
CVE-2026-34331 has been classified to as a Race Condition vulnerability or weakness.
What is a Dangling pointer Vulnerability?
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
CVE-2026-34331 has been classified to as a Dangling pointer vulnerability or weakness.
Products Associated with CVE-2026-34331
Want to know whenever a new CVE is published for Microsoft products? stack.watch will email you.
Affected Versions
Microsoft Windows 10 Version 1607:- Version 10.0.14393.0 and below 10.0.14393.9140 is affected.
- Version 10.0.17763.0 and below 10.0.17763.8755 is affected.
- Version 10.0.19044.0 and below 10.0.19044.7291 is affected.
- Version 10.0.19045.0 and below 10.0.19045.7291 is affected.
- Version 10.0.22631.0 and below 10.0.22631.7079 is affected.
- Version 10.0.22631.0 and below 10.0.22631.7079 is affected.
- Version 10.0.26100.0 and below 10.0.26100.8457 is affected.
- Version 10.0.26200.0 and below 10.0.26200.8457 is affected.
- Version 10.0.28000.0 and below 10.0.28000.2113 is affected.
- Version 6.2.9200.0 and below 6.2.9200.26079 is affected.
- Version 6.2.9200.0 and below 6.2.9200.26079 is affected.
- Version 6.3.9600.0 and below 6.3.9600.23181 is affected.
- Version 6.3.9600.0 and below 6.3.9600.23181 is affected.
- Version 10.0.14393.0 and below 10.0.14393.9140 is affected.
- Version 10.0.14393.0 and below 10.0.14393.9140 is affected.
- Version 10.0.17763.0 and below 10.0.17763.8755 is affected.
- Version 10.0.17763.0 and below 10.0.17763.8755 is affected.
- Version 10.0.20348.0 and below 10.0.20348.5139 is affected.
- Version 10.0.25398.0 and below 10.0.25398.2330 is affected.
- Version 10.0.26100.0 and below 10.0.26100.32860 is affected.
- Version 10.0.26100.0 and below 10.0.26100.32860 is affected.