CVE-2026-27906: Windows Hello Security Feature Bypass Vulnerability

Overview

Severity
Medium (CVSS 4.4)
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
Category
Security Feature Bypass
Exploit Status
Not Exploited
Exploitation Likelihood
More Likely
Patch Tuesday
2026-Apr
Released
2026-04-14

Description

Improper input validation in Windows Hello allows an authorized attacker to bypass a security feature locally.

FAQ

What kind of security feature could be bypassed by successfully exploiting this vulnerability? This vulnerability could allow an attacker with administrative control of the operating system to bypass protection mechanisms that rely on trusted, non‑rollback TPM counters. Specifically, it could undermine Windows Hello’s safeguards that prevent reuse of pre‑generated authentication keys and Recall’s protections against loading older, potentially tampered‑with settings.

Affected Products (14)

Windows

  • Windows 10 Version 21H2 for 32-bit Systems
  • Windows 10 Version 21H2 for ARM64-based Systems
  • Windows 10 Version 21H2 for x64-based Systems
  • Windows 11 Version 25H2 for ARM systems
  • Windows 11 Version 25H2 for x64-based Systems
  • Windows 11 Version 23H2 for ARM64-based Systems
  • Windows 11 Version 23H2 for x64-based Systems
  • Windows 11 Version 24H2 for ARM64-based Systems
  • Windows 11 Version 24H2 for x64-based Systems
  • Windows 11 Version 26H1 for ARM64-based Systems
  • Windows 11 version 26H1 for x64-based Systems

ESU

  • Windows 10 Version 22H2 for x64-based Systems
  • Windows 10 Version 22H2 for ARM64-based Systems
  • Windows 10 Version 22H2 for 32-bit Systems

Security Updates (5)

Acknowledgments

Nate Jones with Microsoft

Revision History

  • 2026-04-14: Information published.