CVE-2026-40403 – Windows Graphics Component Remote Code Execution Vulnerability

CVSS 8.8 IMPORTANT

“A compromise inside a virtualized environment should never become a bridge into the host operating system.”

A critical remote code execution vulnerability exists in the Windows Graphics Component (Win32K – GRFX) due to a heap-based buffer overflow. The flaw allows an authenticated attacker with low privileges to execute code locally and potentially escape a contained execution environment, including scenarios involving guest virtual machines attacking the host operating system.
CVSS Score: 8.8
SEVERITY: Critical
THREAT:
This vulnerability could allow an attacker with local access to execute arbitrary code and potentially break out of isolated execution environments. Successful exploitation may lead to compromise of the host operating system, unauthorized access to sensitive systems, and broader infrastructure impact.

EXPLOITS:
At the time of publication, Microsoft reports that the vulnerability was not publicly disclosed and was not exploited in the wild. Exploit Code Maturity is listed as Unproven, and exploitation is assessed as Less Likely.

TECHNICAL SUMMARY:
CVE-2026-40403 is caused by a heap-based buffer overflow in Windows Win32K – GRFX. The vulnerability allows an authenticated attacker to execute code locally by exploiting improper memory handling within the graphics component. The CVSS scope is marked as Changed, meaning successful exploitation can impact systems outside the original security boundary.
Microsoft states that the vulnerability could lead to a contained execution environment escape. An attacker who gains access to a local guest virtual machine could potentially exploit the flaw to attack the host operating system. The vulnerable endpoint is only accessible over the local VM interface because external communication is blocked.

EXPLOITABILITY:
Affected software is the Windows Graphics Component (Win32K – GRFX). Exploitation requires local access and low privileges. Attackers may abuse the flaw from a guest VM environment to target the host OS.

BUSINESS IMPACT:
Virtualization and isolation technologies are heavily relied upon in enterprise and cloud environments. A successful escape from a contained environment could undermine host security controls, expose sensitive workloads, and create opportunities for attackers to move between systems that were expected to remain isolated.

WORKAROUND:
No mitigations or workarounds are listed. Organizations should apply the official Microsoft security update as soon as possible.

URGENCY:
This vulnerability should be treated as a high-priority issue because it affects virtualization and isolation boundaries, requires only low privileges, and could enable guest-to-host compromise scenarios. Even though exploitation is assessed as Less Likely, containment escape vulnerabilities carry significant security implications in enterprise and cloud environments.

Key Details

Affected Product
Microsoft Windows 10 1607
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
CWE Classification
CWE-122
Patch this CVE on all your endpoints in under 5 minutes. First 200 endpoints are free forever, scale as needed.