{"dataType": "CVE_RECORD", "containers": {"cna": {"metrics": [{"format": "CVSS", "cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}}], "affected": [{"cpes": ["cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*"], "vendor": "microsoft", "product": "windows_10_1607", "versions": [{"status": "affected", "version": "10.0.14393.0", "lessThan": "10.0.14393.9060", "versionType": "custom"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*"], "vendor": "microsoft", "product": "windows_10_1809", "versions": [{"status": "affected", "version": "10.0.17763.0", "lessThan": "10.0.17763.8644", "versionType": "custom"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*"], "vendor": "microsoft", "product": "windows_10_21h2", "versions": [{"status": "affected", "version": "10.0.19044.0", "lessThan": "10.0.19044.7184", "versionType": "custom"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*"], "vendor": "microsoft", "product": "windows_10_22h2", "versions": [{"status": "affected", "version": "10.0.19045.0", "lessThan": "10.0.19045.7184", "versionType": "custom"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*"], "vendor": "microsoft", "product": "windows_11_23h2", "versions": [{"status": "affected", "version": "10.0.22631.0", "lessThan": "10.0.22631.6936", "versionType": "custom"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*"], "vendor": "microsoft", "product": "windows_11_24h2", "versions": [{"status": "affected", "version": "10.0.26100.0", "lessThan": "10.0.26100.8246", "versionType": "custom"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:microsoft:windows_11_25h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_25h2:*:*:*:*:*:*:x64:*"], "vendor": "microsoft", "product": "windows_11_25h2", "versions": [{"status": "affected", "version": "10.0.26200.0", "lessThan": "10.0.26200.8246", "versionType": "custom"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:microsoft:windows_11_26h1:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_26h1:*:*:*:*:*:*:x64:*"], "vendor": "microsoft", "product": "windows_11_26h1", "versions": [{"status": "affected", "version": "10.0.28000.0", "lessThan": "10.0.28000.1836", "versionType": "custom"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"], "vendor": "microsoft", "product": "windows_server_2012", "versions": [{"status": "affected", "version": "6.2.9200"}, {"status": "affected", "version": "6.3.9600"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"], "vendor": "microsoft", "product": "windows_server_2016", "versions": [{"status": "affected", "version": "10.0.14393.0", "lessThan": "10.0.14393.9060", "versionType": "custom"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*"], "vendor": "microsoft", "product": "windows_server_2019", "versions": [{"status": "affected", "version": "10.0.17763.0", "lessThan": "10.0.17763.8644", "versionType": "custom"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*"], "vendor": "microsoft", "product": "windows_server_2022", "versions": [{"status": "affected", "version": "10.0.20348.0", "lessThan": "10.0.20348.5020", "versionType": "custom"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"], "vendor": "microsoft", "product": "windows_server_2022_23h2", "versions": [{"status": "affected", "version": "10.0.25398.0", "lessThan": "10.0.25398.2274", "versionType": "custom"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*"], "vendor": "microsoft", "product": "windows_server_2025", "versions": [{"status": "affected", "version": "10.0.26100.0", "lessThan": "10.0.26100.32690", "versionType": "custom"}], "defaultStatus": "unaffected"}], "references": [{"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32150", "tags": ["vendor-advisory"]}], "descriptions": [{"lang": "en", "value": "Concurrent execution using shared resource with improper synchronization ('race condition') in Function Discovery Service (fdwsd.dll) allows an authorized attacker to elevate privileges locally."}], "problemTypes": [{"descriptions": [{"lang": "en", "cweId": "CWE-362", "description": "CWE-362"}]}], "x_remediations": {"windows": [{"type": "update", "anyOf": ["KB5082052"], "products": ["Windows 11 Version 23H2 for ARM64-based Systems", "Windows 11 Version 23H2 for x64-based Systems"]}, {"type": "update", "anyOf": ["KB5082060", "KB5091571"], "products": ["Windows Server 2022, 23H2 Edition (Server Core installation)"]}, {"type": "update", "anyOf": ["KB5082063", "KB5091157"], "products": ["Windows Server 2025", "Windows Server 2025 (Server Core installation)"]}, {"type": "update", "anyOf": ["KB5082123", "KB5091573"], "products": ["Windows 10 Version 1809 for 32-bit Systems", "Windows 10 Version 1809 for x64-based Systems", "Windows Server 2019", "Windows Server 2019 (Server Core installation)"]}, {"type": "update", "anyOf": ["KB5082126"], "products": ["Windows Server 2012 R2", "Windows Server 2012 R2 (Server Core installation)"]}, {"type": "update", "anyOf": ["KB5082127"], "products": ["Windows Server 2012", "Windows Server 2012 (Server Core installation)"]}, {"type": "update", "anyOf": ["KB5082142", "KB5091575"], "products": ["Windows Server 2022", "Windows Server 2022 (Server Core installation)"]}, {"type": "update", "anyOf": ["KB5082198", "KB5091572"], "products": ["Windows 10 Version 1607 for 32-bit Systems", "Windows 10 Version 1607 for x64-based Systems", "Windows Server 2016", "Windows Server 2016 (Server Core installation)"]}, {"type": "update", "anyOf": ["KB5082200"], "products": ["Windows 10 Version 21H2 for 32-bit Systems", "Windows 10 Version 21H2 for ARM64-based Systems", "Windows 10 Version 21H2 for x64-based Systems", "Windows 10 Version 22H2 for 32-bit Systems", "Windows 10 Version 22H2 for ARM64-based Systems", "Windows 10 Version 22H2 for x64-based Systems"]}, {"type": "update", "anyOf": ["KB5083768"], "products": ["Windows 11 Version 26H1 for ARM64-based Systems", "Windows 11 version 26H1 for x64-based Systems"]}, {"type": "update", "anyOf": ["KB5083769"], "products": ["Windows 11 Version 24H2 for ARM64-based Systems", "Windows 11 Version 24H2 for x64-based Systems", "Windows 11 Version 25H2 for ARM64-based Systems", "Windows 11 Version 25H2 for x64-based Systems"]}]}, "providerMetadata": {"orgId": "00000000-0000-4000-A000-000000000003", "shortName": "nvd", "dateUpdated": "2026-04-14T18:17:15Z", "x_subShortName": "nvd"}}}, "cveMetadata": {"cveId": "CVE-2026-32150", "state": "PUBLISHED", "dateUpdated": "2026-04-20T18:24:38Z", "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "datePublished": "2026-04-14T18:17:15Z", "assignerShortName": "microsoft"}, "dataVersion": "5.0"}