CVE-2021-26868

HIGH

Windows Graphics Component - Elevation of Privilege via Memory Buffer Overflow

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2021-26868. PoCs published by KangD1W2.

AI-analyzed exploit summary This is a working proof-of-concept exploit for CVE-2021-26868, targeting a local privilege escalation vulnerability in Windows via the DirectComposition API. The exploit leverages memory corruption to achieve arbitrary kernel write primitives and ultimately executes a shellcode payload.

Description

Windows Graphics Component Elevation of Privilege Vulnerability

Exploits (1)

nomisec WORKING POC 11 stars
by KangD1W2 · poc
https://github.com/KangD1W2/CVE-2021-26868

This is a working proof-of-concept exploit for CVE-2021-26868, targeting a local privilege escalation vulnerability in Windows via the DirectComposition API. The exploit leverages memory corruption to achieve arbitrary kernel write primitives and ultimately executes a shellcode payload.

Classification
Working Poc 95%
Attack Type
Lpe
Complexity
Complex
Reliability
Reliable
Target: Microsoft Windows (builds 18362, 18363, 19041, 19042)
No auth needed
Prerequisites: Windows system with vulnerable build · Local access to the target system
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (1)

Core 1
Core References

Scores

CVSS v3 7.8
EPSS 0.0495
EPSS Percentile 89.8%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-119
Status published
Products (16)
microsoft/windows_10
microsoft/windows_10 20h2
microsoft/windows_10 1607
microsoft/windows_10 1803
microsoft/windows_10 1809
microsoft/windows_10 1909
microsoft/windows_10 2004
microsoft/windows_8.1
microsoft/windows_rt_8.1
microsoft/windows_server_2012
... and 6 more
Published Mar 11, 2021
Tracked Since Feb 18, 2026