CVE-2026-33827

CWE-362Race Condition4 documents4 sources
Severity
8.1HIGH
EPSS
No EPSS data
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 14

Description

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows TCP/IP allows an unauthorized attacker to execute code over a network.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9

Affected Packages20 packages

CVEListV5microsoft/windows_server_20126.2.9200.06.2.9200.26026
CVEListV5microsoft/windows_server_201610.0.14393.010.0.14393.9060
CVEListV5microsoft/windows_server_201910.0.17763.010.0.17763.8644
CVEListV5microsoft/windows_server_202210.0.20348.010.0.20348.5020
CVEListV5microsoft/windows_server_202510.0.26100.010.0.26100.32690

🔴Vulnerability Details

2
CVEList
Windows TCP/IP Remote Code Execution Vulnerability2026-04-14
VulDB
Microsoft Windows up to Server 2025 TCP/IP race condition2026-04-14
CVE-2026-33827 (HIGH CVSS 8.1) | Concurrent execution using shared r | cvebase.io