CERT Advisories

CISA Flags Actively Exploited Windows Kernel Vulnerability (CVE-2026-12345)

2 min readSource: CISA Cybersecurity Advisories

CISA adds CVE-2026-12345 to its KEV catalog after confirming in-the-wild exploitation of this Windows Kernel privilege-escalation flaw. Federal agencies must patch by February 17, 2026.

CISA Adds Actively Exploited Windows Kernel Flaw to KEV Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-12345, a Windows Kernel privilege-escalation vulnerability, to its Known Exploited Vulnerabilities (KEV) Catalog after confirming evidence of active exploitation in the wild. The directive requires all Federal Civilian Executive Branch (FCEB) agencies to remediate the flaw by February 17, 2026.

Technical Details

  • CVE ID: CVE-2026-12345
  • Affected Component: Windows Kernel (all supported versions of Windows 10, 11, and Server 2016/2019/2022)
  • Vulnerability Type: Privilege Escalation (Local)
  • CVSS Score: 7.8 (High)
  • Exploitation Vector: Local attack requiring user interaction (e.g., malicious file execution or social engineering)
  • Patch Availability: Microsoft released fixes in the January 2026 Patch Tuesday updates (KB500XXX)

The flaw stems from improper handling of objects in memory, allowing attackers to execute arbitrary code with SYSTEM-level privileges. While CISA has not disclosed specific threat actors or attack campaigns, the agency’s inclusion in the KEV catalog signals confirmed exploitation by adversaries.

Impact Analysis

  • Risk to Federal Agencies: Binding Operational Directive (BOD) 22-01 mandates FCEB agencies to patch CVE-2026-12345 within the three-week window, prioritizing it as a critical risk to government networks.
  • Enterprise and Critical Infrastructure: Organizations outside the federal scope are strongly urged to apply patches immediately, as privilege-escalation flaws are frequently chained with other exploits (e.g., phishing, RCE) in advanced attack scenarios.
  • Exploitation Likelihood: Local privilege-escalation vulnerabilities are highly valuable to threat actors for bypassing security controls, persisting on systems, or deploying ransomware.

Recommendations

  1. Patch Immediately: Apply Microsoft’s January 2026 updates (KB500XXX) to all affected Windows systems without delay.
  2. Prioritize Critical Assets: Focus on workstations, domain controllers, and servers handling sensitive data.
  3. Monitor for Exploitation: Deploy EDR/XDR solutions to detect anomalous process execution or privilege-escalation attempts linked to CVE-2026-12345.
  4. Review Access Controls: Limit local admin privileges to reduce the attack surface for post-exploitation activities.
  5. Verify Compliance: Federal agencies must confirm remediation via CISA’s reporting mechanisms by the February 17 deadline.

For further guidance, refer to CISA’s advisory or Microsoft’s security update guide.

Share