High severity7.7NVD Advisory· Published Apr 14, 2026· Updated Apr 23, 2026
CVE-2026-27913
CVE-2026-27913
Description
Improper input validation in Windows BitLocker allows an unauthorized attacker to bypass a security feature locally.
Affected products
7cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*Range: <10.0.14393.9060
- cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*Range: <10.0.17763.8644
- cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*Range: <10.0.20348.5020
- cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*Range: <10.0.25398.2274
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27913nvdVendor Advisory
News mentions
5- Zero-Day Exploit Against Windows BitLockerSchneier on Security · May 18, 2026
- Windows BitLocker zero-day gives access to protected drives, PoC releasedBleepingComputer · May 13, 2026
- Microsoft fixes BitLocker recovery issue only for Windows 11 usersBleepingComputer · May 13, 2026
- Patch Tuesday - April 2026Rapid7 Blog · Apr 14, 2026
- Microsoft Patch Tuesday for April 2026 - Snort Rule and Prominent VulnerabilitiesCisco Talos Intelligence · Apr 14, 2026