CVE-2026-27906: Windows Hello Security Feature Bypass Vulnerability
Overview
- Severity
- Medium (CVSS 4.4)
- CVSS Vector
- CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
- Category
- Security Feature Bypass
- Exploit Status
- Not Exploited
- Exploitation Likelihood
- More Likely
- Patch Tuesday
- 2026-Apr
- Released
- 2026-04-14
Description
Improper input validation in Windows Hello allows an authorized attacker to bypass a security feature locally.
FAQ
What kind of security feature could be bypassed by successfully exploiting this vulnerability?
This vulnerability could allow an attacker with administrative control of the operating system to bypass protection mechanisms that rely on trusted, non‑rollback TPM counters. Specifically, it could undermine Windows Hello’s safeguards that prevent reuse of pre‑generated authentication keys and Recall’s protections against loading older, potentially tampered‑with settings.
Affected Products (14)
Windows
- Windows 10 Version 21H2 for 32-bit Systems
- Windows 10 Version 21H2 for ARM64-based Systems
- Windows 10 Version 21H2 for x64-based Systems
- Windows 11 Version 25H2 for ARM systems
- Windows 11 Version 25H2 for x64-based Systems
- Windows 11 Version 23H2 for ARM64-based Systems
- Windows 11 Version 23H2 for x64-based Systems
- Windows 11 Version 24H2 for ARM64-based Systems
- Windows 11 Version 24H2 for x64-based Systems
- Windows 11 Version 26H1 for ARM64-based Systems
- Windows 11 version 26H1 for x64-based Systems
ESU
- Windows 10 Version 22H2 for x64-based Systems
- Windows 10 Version 22H2 for ARM64-based Systems
- Windows 10 Version 22H2 for 32-bit Systems
Security Updates (5)
Acknowledgments
Nate Jones with Microsoft
Revision History
- 2026-04-14: Information published.