High severity8.7NVD Advisory· Published Apr 14, 2026· Updated Apr 22, 2026
CVE-2026-27928
CVE-2026-27928
Description
Improper input validation in Windows Hello allows an unauthorized attacker to bypass a security feature over a network.
Affected products
5- cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*Range: <10.0.14393.9060
- cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*Range: <10.0.17763.8644
- cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*Range: <10.0.20348.5020
- cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*Range: <10.0.25398.2274
- cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*Range: <10.0.26100.32690
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27928nvdVendor Advisory
News mentions
0No linked articles in our index yet.