CVE-2026-20929 – Windows HTTP.sys Elevation of Privilege Vulnerability

CVSS 7.5 IMPORTANT

“This flaw turns a trusted network foothold into a chance to climb higher inside Windows, making a routine compromise far more dangerous.”

CVE-2026-20929 is a high-severity elevation of privilege vulnerability in Microsoft Windows HTTP.sys caused by improper access control. It allows an authorized attacker to elevate privileges over a network, which means an attacker who already has some level of access could use the flaw to gain stronger control over an affected system. While there is no confirmed public exploitation listed here, the issue is still serious because privilege escalation flaws often help attackers deepen an intrusion, expand access, and strengthen persistence after an initial breach.

CVSS Score: 7.5

SEVERITY:
High

THREAT:
An authorized attacker could exploit improper access control in Windows HTTP.sys to elevate privileges over a network. This makes the vulnerability especially concerning in environments where attackers may already have a low-privileged foothold and are looking to move toward administrative control.

EXPLOITS:
There is no confirmed active exploitation noted in the provided data. There is also no clear public zero-day status indicated here. However, because this is a network-based elevation of privilege issue in a core Windows component, security teams should assume exploit interest is likely once patch analysis becomes widespread.

TECHNICAL SUMMARY:
CVE-2026-20929 affects Windows HTTP.sys, the kernel-level HTTP protocol stack used by Windows to process web traffic and support HTTP-based services. The vulnerability is caused by improper access control, meaning HTTP.sys does not correctly enforce restrictions in certain conditions. An attacker with authorized access can abuse this weakness over the network to gain elevated privileges on the target system. Because HTTP.sys operates in a highly privileged part of the operating system, successful exploitation can have a severe impact on confidentiality, integrity, and availability. In practical terms, this flaw can help an attacker move from limited access to a far more powerful position on the host, increasing the chance of deeper compromise and follow-on attacks.

EXPLOITABILITY:
Affected versions include Windows 10 Version 1607 and other supported Windows releases that use the vulnerable HTTP.sys component prior to the relevant security updates. On Windows 10 Version 1607, vulnerable builds are those before 10.0.14393.8783. Exploitation requires the attacker to already be authorized at some level and able to reach the target over the network.

BUSINESS IMPACT:
This vulnerability is dangerous because it can help attackers turn a small breach into a major security incident. A low-level compromise that might otherwise be contained can become a stepping stone to privileged access, broader system control, and stronger persistence. In business terms, that can lead to service disruption, unauthorized access to sensitive data, damage to critical systems, and increased recovery costs. Powerful privilege escalation flaws often become the force multiplier that turns ordinary intrusion activity into a full operational crisis.

WORKAROUND:
The preferred mitigation is to apply Microsoft’s security update. If the patch cannot be deployed immediately, reduce exposure by limiting access to affected systems, restricting unnecessary HTTP-based services, segmenting sensitive hosts, and monitoring closely for suspicious privilege escalation activity tied to HTTP services. No strong substitute for patching is available.

Key Details

Affected Product
Microsoft Windows 10 1607
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
None
CWE Classification
CWE-284
Patch this CVE on all your endpoints in under 5 minutes. First 200 endpoints are free forever, scale as needed.