Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-7791

Summary
Assigner-AMZN
Assigner Org ID-ff89ba41-3aa1-4d27-914a-91399e9639e5
Published At-04 May, 2026 | 22:07
Updated At-06 May, 2026 | 03:56
Rejected At-
Credits

Improper privilege management in the log rotation mechanism of the Skylight Workspace Config Service in Amazon WorkSpaces for Windows before 2.6.2034.0 allows a local non-admin authenticated user to place arbitrary files into arbitrary locations bypassing file system permission protections, leading to local privilege escalation to SYSTEM.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:AMZN
Assigner Org ID:ff89ba41-3aa1-4d27-914a-91399e9639e5
Published At:04 May, 2026 | 22:07
Updated At:06 May, 2026 | 03:56
Rejected At:
â–¼CVE Numbering Authority (CNA)

Improper privilege management in the log rotation mechanism of the Skylight Workspace Config Service in Amazon WorkSpaces for Windows before 2.6.2034.0 allows a local non-admin authenticated user to place arbitrary files into arbitrary locations bypassing file system permission protections, leading to local privilege escalation to SYSTEM.

Affected Products
Vendor
Amazon
Product
Workspaces
Default Status
unaffected
Versions
Unaffected
  • 2.6.2034.0
Problem Types
TypeCWE IDDescription
CWECWE-367CWE-367: Time-of-Check Time-of-Use (TOCTOU) Race Condition
Type: CWE
CWE ID: CWE-367
Description: CWE-367: Time-of-Check Time-of-Use (TOCTOU) Race Condition
Metrics
VersionBase scoreBase severityVector
3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
4.08.5HIGH
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Version: 4.0
Base score: 8.5
Base severity: HIGH
Vector:
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-29CAPEC-29: Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions
CAPEC ID: CAPEC-29
Description: CAPEC-29: Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://aws.amazon.com/security/security-bulletins/2026-025-aws/
vendor-advisory
Hyperlink: https://aws.amazon.com/security/security-bulletins/2026-025-aws/
Resource:
vendor-advisory
â–¼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:ff89ba41-3aa1-4d27-914a-91399e9639e5
Published At:04 May, 2026 | 22:16
Updated At:05 May, 2026 | 19:32

Improper privilege management in the log rotation mechanism of the Skylight Workspace Config Service in Amazon WorkSpaces for Windows before 2.6.2034.0 allows a local non-admin authenticated user to place arbitrary files into arbitrary locations bypassing file system permission protections, leading to local privilege escalation to SYSTEM.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.08.5HIGH
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Secondary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 4.0
Base score: 8.5
Base severity: HIGH
Vector:
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Secondary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-367Secondaryff89ba41-3aa1-4d27-914a-91399e9639e5
CWE ID: CWE-367
Type: Secondary
Source: ff89ba41-3aa1-4d27-914a-91399e9639e5
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://aws.amazon.com/security/security-bulletins/2026-025-aws/ff89ba41-3aa1-4d27-914a-91399e9639e5
N/A
Hyperlink: https://aws.amazon.com/security/security-bulletins/2026-025-aws/
Source: ff89ba41-3aa1-4d27-914a-91399e9639e5
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

66Records found

CVE-2021-26910
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.05% / 15.74%
||
7 Day CHG~0.00%
Published-08 Feb, 2021 | 19:56
Updated-03 Aug, 2024 | 20:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Firejail before 0.9.64.4 allows attackers to bypass intended access restrictions because there is a TOCTOU race condition between a stat operation and an OverlayFS mount operation.

Action-Not Available
Vendor-firejail_projectn/aDebian GNU/Linux
Product-firejaildebian_linuxn/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-13961
Matching Score-4
Assigner-NortonLifeLock Inc.
ShareView Details
Matching Score-4
Assigner-NortonLifeLock Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 19.40%
||
7 Day CHG~0.00%
Published-09 May, 2025 | 15:20
Updated-12 May, 2025 | 17:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Avast Cleanup Premium TuneupSvc Link Following Local Privilege Escalation Vulnerability

Link Following Local Privilege Escalation Vulnerability in TuneupSvc in Avast Cleanup Premium Version 24.2.16593.17810 on Windows 10 Pro x64 allows local attackers to escalate privileges and execute arbitrary code in the context of SYSTEM via creating a symbolic link and leveraging a TOCTTOU (time-of-check to time-of-use) attack.

Action-Not Available
Vendor-Avast
Product-CleanUp Premium
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2024-13960
Matching Score-4
Assigner-NortonLifeLock Inc.
ShareView Details
Matching Score-4
Assigner-NortonLifeLock Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 19.40%
||
7 Day CHG~0.00%
Published-09 May, 2025 | 15:20
Updated-12 May, 2025 | 17:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Link Following Local Privilege Escalation Vulnerability in AVG TuneUp Version 23.4

Link Following Local Privilege Escalation Vulnerability in TuneUp Service in AVG TuneUp Version 23.4 (build 15592) on Windows 10 allows local attackers to escalate privileges and execute arbitrary code in the context of SYSTEM via creating a symbolic link and leveraging a TOCTTOU (time-of-check to time-of-use) attack.

Action-Not Available
Vendor-AVG
Product-TuneUp
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2022-22093
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.10% / 27.30%
||
7 Day CHG~0.00%
Published-16 Sep, 2022 | 05:25
Updated-03 Aug, 2024 | 03:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Memory corruption or temporary denial of service due to improper handling of concurrent hypervisor operations to attach or detach IRQs from virtual interrupt sources in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewcn3991wsa8830wcd9380_firmwaresd780gsd865_5gqca6431_firmwaresdx55m_firmwarewcn6856_firmwaresd888wsa8835wcd9380sd765g_firmwaresd888_5gqca6420_firmwareqca6390_firmwarewcd9370wcn6855_firmwaresm8475p_firmwaresm7325pqca6426qrb5165n_firmwareqca6430_firmwarewcn6750wcn3998sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwaresd_8cx_gen2_firmwaresd_8_gen1_5g_firmwarewcd9340_firmwarewsa8815sm7325p_firmwareqsm8350_firmwarewcn6850qsm8350sd765qca6426_firmwaresm7315_firmwarewcn7850sd768g_firmwarewcd9375_firmwarewcn3998_firmwareqrb5165msm7315sm7250p_firmwareqca6391sdx55mqca6420qca6436_firmwareqrb5165nqca6421_firmwaresm8475_firmwaresm7450_firmwareaqt1000_firmwaresd778gwcn6740_firmwaresd_8cx_gen2wcn7851qcs6490qrb5165_firmwareqrb5165m_firmwaresdxr2_5gqcm6490_firmwarewsa8832_firmwareqrb5165wcn6851_firmwareqca6430qca6421sd778g_firmwarewcd9340wsa8810_firmwaresd765gwcd9341_firmwarewsa8810sd765_firmwaresd870qca6436wcn6851wsa8832wcn6855wcn7851_firmwarewcn6856wcd9385wcd9341sd768gqca6431qcs6490_firmwaresd870_firmwarewcn6740qca6391_firmwareqca6390wcd9375sd_8cxaqt1000sd780g_firmwarewcd9370_firmwaresd888_firmwarewsa8830_firmwaresd865_5g_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewcn7850_firmwarewsa8815_firmwarewsa8835_firmwaresm7250psm7450sm8475wcn6750_firmwaresm8475pSnapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2021-1921
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 8.76%
||
7 Day CHG~0.00%
Published-12 Nov, 2021 | 06:15
Updated-03 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Possible memory corruption due to Improper handling of hypervisor unmap operations for concurrent memory operations in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wsa8830wcd9380_firmwarewcn3990sd780gsd865_5gqca6595qca6431_firmwaresdx24sdx55m_firmwarewcn6856_firmwarewcd9360_firmwarewsa8835wcn3950_firmwarewcd9380sd888_5gqca6420_firmwareqca6390_firmwarewcd9370sd675_firmwarewcn6855_firmwareqca6426sdx24_firmwarewcn3990_firmwareqrb5165n_firmwaresm7325qca6430_firmwarewcn3980wcn6750wcn3998sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwarewcn3950whs9410wcd9340_firmwaresd855wsa8815wcn6850qsm8350_firmwareqsm8350sd_8c_firmwareqca6426_firmwarewcn7850qca6574au_firmwaresdx55_firmwarewcd9375_firmwarewcn3998_firmwarewcn3980_firmwareqca6391sdx55mwcd9360qca6420qca6436_firmwareqrb5165nqca6421_firmwareaqt1000_firmwarewcn6740_firmwaresd778gsa6155p_firmwarewhs9410_firmwarewcn7851qcs6490qrb5165_firmwaresdxr2_5gqcm6490_firmwareqrb5165wcn6851_firmwareqca6430qca6574auqca6421sd778g_firmwarewcd9340sa8195psdm830_firmwarewsa8810_firmwarewcd9341_firmwarewsa8810sd870qca6436wcn6851wcn6855sa6155pwcn7851_firmwarewcn6856sd_8cwcd9385wcd9341qca6431qcs6490_firmwareqca6595_firmwaresd870_firmwarewcn6740qca6391_firmwareqca6390wcd9375sd_8cxaqt1000sd780g_firmwarewcd9370_firmwaresdx55sd675wsa8830_firmwaresd855_firmwaresd865_5g_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewcn7850_firmwarewsa8815_firmwarewsa8835_firmwaresa8195p_firmwaresdm830wcn6750_firmwaresm7325_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-13944
Matching Score-4
Assigner-NortonLifeLock Inc.
ShareView Details
Matching Score-4
Assigner-NortonLifeLock Inc.
CVSS Score-7.8||HIGH
EPSS-0.06% / 19.40%
||
7 Day CHG~0.00%
Published-09 May, 2025 | 15:18
Updated-13 Oct, 2025 | 10:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Link Following Local Privilege Escalation Vulnerability in NortonUtilitiesSvc in Norton Utilities Ultimate (Also affects Avast CleanUp and AVG TuneUp)

Link Following Local Privilege Escalation Vulnerability in NortonUtilitiesSvc in Norton Utilities Ultimate Version 24.2.16862.6344 on Windows 10 Pro x64 allows local attackers to escalate privileges and execute arbitrary code in the context of SYSTEM via the creation of a symbolic link and leveraging a TOCTTOU (time-of-check to time-of-use) attack.

Action-Not Available
Vendor-AvastAVGNorton
Product-TuneUpCleanUpNorton Utilities Ultimate
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2026-41702
Matching Score-4
Assigner-VMware by Broadcom
ShareView Details
Matching Score-4
Assigner-VMware by Broadcom
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.96%
||
7 Day CHG~0.00%
Published-15 May, 2026 | 06:11
Updated-18 May, 2026 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TOCTOU local privilege escalation vulnerability

VMware Fusion contains a TOCTOU (Time-of-check Time-of-use) vulnerability that occurs during an operation performed by a SETUID binary. A malicious actor with local non-administrative user privileges may exploit this vulnerability to escalate privileges to root on the system where Fusion is installed.

Action-Not Available
Vendor-VMware (Broadcom Inc.)
Product-fusionFusion
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-26522
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.68% / 71.80%
||
7 Day CHG-0.12%
Published-08 May, 2026 | 00:00
Updated-08 May, 2026 | 16:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The socket connection handler in aswArPot.sys in the Avast and AVG Windows Anti Rootkit driver before 22.1 allows local attackers to execute arbitrary code in kernel mode or cause a denial of service (memory corruption and OS crash) due to a double fetch vulnerability at aswArPot+0xc4a3.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2025-34290
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-8.5||HIGH
EPSS-0.01% / 2.98%
||
7 Day CHG-0.01%
Published-20 Dec, 2025 | 20:01
Updated-23 Dec, 2025 | 14:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Versa SASE Client for Windows < 7.9.5 Arbitrary Folder Deletion Leading to Local Privilege Escalation

Versa SASE Client for Windows versions released between 7.8.7 and 7.9.4 contain a local privilege escalation vulnerability in the audit log export functionality. The client communicates user-controlled file paths to a privileged service, which performs file system operations without impersonating the requesting user. Due to improper privilege handling and a time-of-check time-of-use race condition combined with symbolic link and mount point manipulation, a local authenticated attacker can coerce the service into deleting arbitrary directories with SYSTEM privileges. This can be exploited to delete protected system folders such as C:\\Config.msi and subsequently achieve execution as NT AUTHORITY\\SYSTEM via MSI rollback techniques.

Action-Not Available
Vendor-Versa Networks
Product-SASE Client for Windows
CWE ID-CWE-250
Execution with Unnecessary Privileges
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2026-35418
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 12.42%
||
7 Day CHG~0.00%
Published-12 May, 2026 | 16:58
Updated-18 May, 2026 | 18:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

Use after free in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_22h2windows_10_21h2windows_10_1809windows_11_25h2windows_server_2022windows_server_2025windows_server_2019windows_11_26h1windows_11_24h2windows_server_2022_23h2windows_11_23h2Windows 11 Version 23H2Windows 11 version 22H3Windows 11 Version 24H2Windows Server 2025 (Server Core installation)Windows Server 2022Windows 10 Version 1809Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2019Windows Server 2025Windows Server 2019 (Server Core installation)Windows 11 version 26H1Windows 11 Version 25H2Windows 10 Version 22H2Windows 10 Version 21H2
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CWE ID-CWE-416
Use After Free
CVE-2023-1295
Matching Score-4
Assigner-Google LLC
ShareView Details
Matching Score-4
Assigner-Google LLC
CVSS Score-7.8||HIGH
EPSS-0.02% / 6.26%
||
7 Day CHG~0.00%
Published-28 Jun, 2023 | 11:08
Updated-13 Feb, 2025 | 16:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Privilege escalation with IO_RING_OP_CLOSE in the Linux Kernel

A time-of-check to time-of-use issue exists in io_uring subsystem's IORING_OP_CLOSE operation in the Linux kernel's versions 5.6 - 5.11 (inclusive), which allows a local user to elevate their privileges to root. Introduced in b5dba59e0cf7e2cc4d3b3b1ac5fe81ddf21959eb, patched in 9eac1904d3364254d622bf2c771c4f85cd435fc2, backported to stable in 788d0824269bef539fe31a785b1517882eafed93.

Action-Not Available
Vendor-Linux Kernel Organization, IncNetApp, Inc.
Product-linux_kernelh500sh410sh410ch300sh700sLinux Kernel
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2021-34986
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-7.8||HIGH
EPSS-0.07% / 21.57%
||
7 Day CHG~0.00%
Published-15 Jul, 2022 | 19:05
Updated-04 Aug, 2024 | 00:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.5.0 (49183). An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Parallels Service. By creating a symbolic link, an attacker can abuse the service to execute a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-13932.

Action-Not Available
Vendor-Parallels International Gmbh
Product-parallels_desktopDesktop
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2026-31678
Matching Score-4
Assigner-kernel.org
ShareView Details
Matching Score-4
Assigner-kernel.org
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.79%
||
7 Day CHG~0.00%
Published-25 Apr, 2026 | 08:46
Updated-11 May, 2026 | 22:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
openvswitch: defer tunnel netdev_put to RCU release

In the Linux kernel, the following vulnerability has been resolved: openvswitch: defer tunnel netdev_put to RCU release ovs_netdev_tunnel_destroy() may run after NETDEV_UNREGISTER already detached the device. Dropping the netdev reference in destroy can race with concurrent readers that still observe vport->dev. Do not release vport->dev in ovs_netdev_tunnel_destroy(). Instead, let vport_netdev_free() drop the reference from the RCU callback, matching the non-tunnel destroy path and avoiding additional synchronization under RTNL.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2025-27076
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.01% / 3.17%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 07:26
Updated-19 Aug, 2025 | 13:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Display

Memory corruption while processing simultaneous requests via escape path.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcm6490_firmwaresnapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)aqt1000snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)_firmwaresnapdragon_7c\+_gen_3_compute_firmwaresm6250snapdragon_7c_compute_platform_\(sc7180-ac\)wsa8835qca6391snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\)fastconnect_7800_firmwarewsa8845_firmwaresc8180x\+sdx55_firmwarewsa8830snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)_firmwarewsa8845h_firmwaresnapdragon_8c_compute_platform_\(sc8180xp-ad\)snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)_firmwareqca6430qcs6490_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-aa\)wsa8815_firmwarevideo_collaboration_vc3_platform_firmwarewsa8810qca6420snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\)wcd9370_firmwaresnapdragon_8c_compute_platform_\(sc8180x-ad\)fastconnect_6800snapdragon_8cx_compute_platform_\(sc8180x-ab\)_firmwarefastconnect_6200_firmwarewsa8840_firmwarewsa8810_firmwarewcd9380_firmwarewsa8835_firmwaresnapdragon_7c_gen_2_compute_platform_\(sc7180-ad\)_\"rennell_pro\"_firmwarewcd9341snapdragon_8cx_compute_platform_\(sc8180xp-ac\)_firmwarewcd9370sm6250_firmwareaqt1000_firmwareqcm5430_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-af\)wcd9385snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-bb\)_firmwarefastconnect_6800_firmwaresnapdragon_7c\+_gen_3_computewsa8840wcd9375_firmwaresc8180x\+sdx55wcd9385_firmwarewsa8815wcd9341_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-ac\)fastconnect_6700_firmwarefastconnect_7800snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-ab\)qcs5430snapdragon_8c_compute_platform_\(sc8180xp-ad\)_firmwarewsa8845hsc8380xpwcd9340qcm6490qcs5430_firmwarefastconnect_6900_firmwaresnapdragon_7c_gen_2_compute_platform_\(sc7180-ad\)_\"rennell_pro\"snapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)_firmwarefastconnect_6700qca6430_firmwaresnapdragon_8c_compute_platform_\(sc8180x-ad\)_firmwarewsa8845fastconnect_6900qcs6490wcd9375video_collaboration_vc3_platformsnapdragon_8cx_compute_platform_\(sc8180xp-af\)_firmwaresc8380xp_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-af\)wcd9340_firmwareqcm5430snapdragon_8cx_compute_platform_\(sc8180x-aa\)_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-ab\)qca6391_firmwarewsa8830_firmwarewcd9380snapdragon_7c_compute_platform_\(sc7180-ac\)_firmwarefastconnect_6200qca6420_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\)_firmwareSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2025-21485
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.05% / 16.43%
||
7 Day CHG~0.00%
Published-03 Jun, 2025 | 05:53
Updated-26 Feb, 2026 | 18:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in DSP Service

Memory corruption while processing INIT and multimode invoke IOCTL calls on FastRPC.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sw5100psm8735_firmwarefastconnect_6900_firmwaresw5100p_firmwarewsa8845_firmwarewcn7880_firmwarewsa8832_firmwaresm8750p_firmwarewcd9390wsa8835sw5100_firmwarewsa8830_firmwarewcd9395wsa8845wsa8840sxr2330pfastconnect_7800wsa8845h_firmwarefastconnect_7800_firmwaresnapdragon_8_gen_3_mobile_platform_firmwaresm8750wsa8830snapdragon_w5\+_gen_1_wearable_platform_firmwarewcn7880wsa8832snapdragon_w5\+_gen_1_wearable_platformsw5100wcd9378wsa8835_firmwarewcn7860fastconnect_6900wcd9385wcd9385_firmwaresm8735sxr2230psm8750psnapdragon_8_gen_3_mobile_platformsxr2250pwcn7861_firmwarewsa8840_firmwarewcn7750sxr2230p_firmwareqmp1000wcn7881sxr2250p_firmwarewcn7860_firmwaresm8750_firmwareqmp1000_firmwarewcd9378_firmwarewsa8845hsxr2330p_firmwarewcd9390_firmwarewcd9380_firmwarewcd9395_firmwarewcn7861wcn7750_firmwarewcd9380wcn7881_firmwareSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2025-21455
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 5.56%
||
7 Day CHG~0.00%
Published-06 Aug, 2025 | 07:25
Updated-26 Feb, 2026 | 17:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Camera_Linux

Memory corruption while submitting blob data to kernel space though IOCTL.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_6800_firmwaresw5100p_firmwarefastconnect_6900_firmwaresnapdragon_8_gen_1_mobile_platform_firmwaresw5100pqca6391_firmwarewsa8815_firmwarewsa8832_firmwaresnapdragon_xr2_5g_platformwsa8810_firmwaresnapdragon_870_5g_mobile_platform_\(sm8250-ac\)sw5100_firmwaresxr2130wcn3980_firmwarewsa8830_firmwarewsa8835fastconnect_7800sd865_5gsnapdragon_870_5g_mobile_platform_\(sm8250-ac\)_firmwaresdx55_firmwarefastconnect_7800_firmwareqca6391wsa8830wsa8832sw5100fastconnect_6800wcn3980wcn3988_firmwaresnapdragon_865_5g_mobile_platform_firmwarewcn3988qca6426_firmwaresnapdragon_8_gen_1_mobile_platformwsa8835_firmwaresnapdragon_x55_5g_modem-rf_system_firmwarefastconnect_6900sd865_5g_firmwarewcd9385wcd9385_firmwareqsm8250snapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)snapdragon_xr2_5g_platform_firmwaresxr2230psxr2250psdx55qca6426qca6436sxr2230p_firmwaresxr2250p_firmwaresnapdragon_865_5g_mobile_platformwsa8815snapdragon_x55_5g_modem-rf_systemwsa8810qsm8250_firmwarewcd9380_firmwareqca6436_firmwaresnapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)_firmwarewcd9380sxr2130_firmwareSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2025-13032
Matching Score-4
Assigner-NortonLifeLock Inc.
ShareView Details
Matching Score-4
Assigner-NortonLifeLock Inc.
CVSS Score-9.9||CRITICAL
EPSS-0.03% / 8.97%
||
7 Day CHG~0.00%
Published-11 Nov, 2025 | 16:16
Updated-08 Dec, 2025 | 18:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Double fetch in sandbox kernel driver in Avast/AVG Antivirus <25.3  on windows allows local attacker to escalate privelages via pool overflow.

Action-Not Available
Vendor-avastAvastAvsatAVGMicrosoft Corporation
Product-antiviruswindowsOne(Free/Premiium/Ultimeat) Antivirus(Free/Inernet Security/Ultimate) Antivirus
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-36929
Matching Score-4
Assigner-Zoom Video Communications, Inc.
ShareView Details
Matching Score-4
Assigner-Zoom Video Communications, Inc.
CVSS Score-7.8||HIGH
EPSS-0.12% / 31.17%
||
7 Day CHG~0.00%
Published-09 Jan, 2023 | 00:00
Updated-09 Apr, 2025 | 14:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local Privilege Escalation in Zoom Rooms for Windows Clients

The Zoom Rooms Installer for Windows prior to 5.12.6 contains a local privilege escalation vulnerability. A local low-privileged user could exploit this vulnerability during the install process to escalate their privileges to the SYSTEM user.

Action-Not Available
Vendor-Zoom Communications, Inc.
Product-roomsZoom Rooms for Windows
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-23084
Matching Score-4
Assigner-FreeBSD
ShareView Details
Matching Score-4
Assigner-FreeBSD
CVSS Score-7.8||HIGH
EPSS-0.05% / 14.23%
||
7 Day CHG~0.00%
Published-15 Feb, 2024 | 04:52
Updated-13 Feb, 2025 | 16:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Potential jail escape vulnerabilities in netmap

The total size of the user-provided nmreq to nmreq_copyin() was first computed and then trusted during the copyin. This time-of-check to time-of-use bug could lead to kernel memory corruption. On systems configured to include netmap in their devfs_ruleset, a privileged process running in a jail can affect the host environment.

Action-Not Available
Vendor-FreeBSD Foundation
Product-freebsdFreeBSDfreebsd
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-22094
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.09% / 25.52%
||
7 Day CHG~0.00%
Published-16 Sep, 2022 | 05:25
Updated-03 Aug, 2024 | 03:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

memory corruption in Kernel due to race condition while getting mapping reference in Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wcn3991_firmwarewcn3991wsa8830wcd9380_firmwaresd780gsd865_5gqca6431_firmwaresdx55m_firmwarewcn6856_firmwaresd888wsa8835wcd9380sd765g_firmwaresd888_5gqca6420_firmwareqca6390_firmwarewcd9370wcn6855_firmwaresm8475p_firmwaresm7325pqca6426qrb5165n_firmwareqca6430_firmwarewcn6750wcn3998sd_8cx_firmwarewcd9385_firmwaresdxr2_5g_firmwaresd_8cx_gen2_firmwaresd_8_gen1_5g_firmwarewcd9340_firmwarewsa8815sm7325p_firmwareqsm8350_firmwarewcn6850qsm8350sd765qca6426_firmwaresm7315_firmwarewcn7850sd768g_firmwarewcd9375_firmwarewcn3998_firmwareqrb5165msm7315sm7250p_firmwareqca6391sdx55mqca6420qca6436_firmwareqrb5165nqca6421_firmwaresm8475_firmwaresm7450_firmwareaqt1000_firmwaresd778gwcn6740_firmwaresd_8cx_gen2wcn7851qcs6490qrb5165_firmwareqrb5165m_firmwaresdxr2_5gqcm6490_firmwarewsa8832_firmwareqrb5165wcn6851_firmwareqca6430qca6421sd778g_firmwarewcd9340wsa8810_firmwaresd765gwcd9341_firmwarewsa8810sd765_firmwaresd870qca6436wcn6851wsa8832wcn6855wcn7851_firmwarewcn6856wcd9385wcd9341sd768gqca6431qcs6490_firmwaresd870_firmwarewcn6740qca6391_firmwareqca6390wcd9375sd_8cxaqt1000sd780g_firmwarewcd9370_firmwaresd888_firmwarewsa8830_firmwaresd865_5g_firmwareqcm6490sd888_5g_firmwarewcn6850_firmwarewcn7850_firmwarewsa8815_firmwarewsa8835_firmwaresm7250psm7450sm8475wcn6750_firmwaresm8475pSnapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2022-34899
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-7||HIGH
EPSS-0.12% / 30.74%
||
7 Day CHG~0.00%
Published-18 Jul, 2022 | 14:17
Updated-03 Aug, 2024 | 09:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Access 6.5.4 (39316) Agent. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability. The specific flaw exists within the Parallels service. By creating a symbolic link, an attacker can abuse the service to execute a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-16134.

Action-Not Available
Vendor-Parallels International Gmbh
Product-parallels_accessAccess
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2021-3922
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-7.8||HIGH
EPSS-0.42% / 61.99%
||
7 Day CHG~0.00%
Published-18 May, 2022 | 16:10
Updated-03 Aug, 2024 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A race condition vulnerability was reported in IMController, a software component of Lenovo System Interface Foundation, prior to version 1.1.20.3 that could allow a local attacker to connect and interact with the IMController child process' named pipe.

Action-Not Available
Vendor-Lenovo Group Limited
Product-system_interface_foundationIMController
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CWE ID-CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CVE-2021-3969
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-7.8||HIGH
EPSS-0.42% / 61.99%
||
7 Day CHG~0.00%
Published-18 May, 2022 | 16:10
Updated-03 Aug, 2024 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Time of Check Time of Use (TOCTOU) vulnerability was reported in IMController, a software component of Lenovo System Interface Foundation, prior to version 1.1.20.3that could allow a local attacker to elevate privileges.

Action-Not Available
Vendor-Lenovo Group Limited
Product-system_interface_foundationIMController
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2021-36924
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.96%
||
7 Day CHG~0.00%
Published-02 Nov, 2021 | 12:37
Updated-04 Aug, 2024 | 01:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

RtsUpx.sys in Realtek RtsUpx USB Utility Driver for Camera/Hub/Audio through 1.14.0.0 allows local low-privileged users to achieve a pool overflow (leading to Escalation of Privileges, Denial of Service, and Code Execution) via a crafted Device IO Control packet to a device.

Action-Not Available
Vendor-n/aRealtek Semiconductor Corp.
Product-rtsupx_usb_utility_drivern/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2026-26224
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-8.5||HIGH
EPSS-0.02% / 3.66%
||
7 Day CHG~0.00%
Published-12 Feb, 2026 | 21:58
Updated-14 May, 2026 | 02:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Intego Log Reporter TOCTOU Local Privilege Escalation

Intego Log Reporter, a macOS diagnostic utility bundled with Intego security products that collects system and application logs for support analysis, contains a local privilege escalation vulnerability. A root-executed diagnostic script creates and writes files in /tmp without enforcing secure directory handling, introducing a time-of-check to time-of-use (TOCTOU) race condition. A local unprivileged user can exploit a symlink-based race condition to cause arbitrary file writes to privileged system locations, resulting in privilege escalation to root.

Action-Not Available
Vendor-Intego
Product-Log Reporter
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2021-3899
Matching Score-4
Assigner-Canonical Ltd.
ShareView Details
Matching Score-4
Assigner-Canonical Ltd.
CVSS Score-7.8||HIGH
EPSS-2.25% / 84.75%
||
7 Day CHG~0.00%
Published-03 Jun, 2024 | 18:40
Updated-26 Aug, 2025 | 17:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is a race condition in the 'replaced executable' detection that, with the correct local configuration, allow an attacker to execute arbitrary code as root.

Action-Not Available
Vendor-ApportCanonical Ltd.
Product-apportubuntu_linuxApportapport
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-53289
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-7.8||HIGH
EPSS-0.10% / 27.85%
||
7 Day CHG~0.00%
Published-11 Dec, 2024 | 07:40
Updated-04 Feb, 2025 | 16:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell ThinOS version 2408 contains a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.

Action-Not Available
Vendor-Dell Inc.
Product-thinosWyse Proprietary OS (Modern ThinOS)
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-53032
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.09% / 24.70%
||
7 Day CHG~0.00%
Published-03 Mar, 2025 | 10:07
Updated-26 Feb, 2026 | 19:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Automotive OS Platform

Memory corruption may occur in keyboard virtual device due to guest VM interaction.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sa9000pqca6595au_firmwaresa8650p_firmwareqam8775psa8255pqamsrv1m_firmwareqca6595qca6688aq_firmwaresa8770psa8775psrv1h_firmwaresa8620p_firmwareqam8650p_firmwareqca6595_firmwaresrv1mqam8620psa8775p_firmwareqamsrv1msa9000p_firmwaresrv1hqca6574ausa7255psrv1m_firmwaresa8620psa7775psa8650pqam8620p_firmwaresa8540p_firmwaresa7255p_firmwareqam8775p_firmwareqam8295p_firmwareqam8255pqca6688aqqca6698aqsa7775p_firmwaresa8255p_firmwaresa8770p_firmwaresa8295p_firmwareqca6696_firmwareqam8295pqamsrv1hsrv1l_firmwareqca6574au_firmwareqamsrv1h_firmwareqca6595auqam8255p_firmwaresa8295psrv1lqca6698aq_firmwareqam8650pqca6696sa8540pSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-53028
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.09% / 24.70%
||
7 Day CHG~0.00%
Published-03 Mar, 2025 | 10:07
Updated-26 Feb, 2026 | 19:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Automotive Vehicle Networks

Memory corruption may occur while processing message from frontend during allocation.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-Snapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2026-27750
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.68%
||
7 Day CHG~0.00%
Published-05 Mar, 2026 | 14:15
Updated-01 Apr, 2026 | 15:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Avira Internet Security Optimizer TOCTOU

Avira Internet Security contains a time-of-check time-of-use (TOCTOU) vulnerability in the Optimizer component. A privileged service running as SYSTEM identifies directories for cleanup during a scan phase and subsequently deletes them during a separate cleanup phase without revalidating the target path. A local attacker can replace a previously scanned directory with a junction or reparse point before deletion occurs, causing the privileged process to delete an unintended system location. This may result in deletion of protected files or directories and can lead to local privilege escalation, denial of service, or system integrity compromise depending on the affected target.

Action-Not Available
Vendor-aviraGen Digital Inc.
Product-internet_securityAvira Internet Security
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-1337
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-55.31% / 98.09%
||
7 Day CHG~0.00%
Published-17 Aug, 2020 | 19:12
Updated-23 Feb, 2026 | 18:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Print Spooler Elevation of Privilege Vulnerability

An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted script or application. The update addresses the vulnerability by correcting how the Windows Print Spooler Component writes to the file system.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016windows_rt_8.1windows_server_2012windows_server_2008windows_10windows_8.1windows_7windows_server_2019Windows 10 Version 1607Windows Server version 2004Windows Server 2019 (Server Core installation)Windows 10 Version 1903 for x64-based SystemsWindows 10 Version 1903 for ARM64-based SystemsWindows Server 2008 Service Pack 2Windows 10 Version 1809Windows Server 2016 (Server Core installation)Windows 10 Version 1903 for 32-bit SystemsWindows 8.1Windows 7Windows Server 2012 (Server Core installation)Windows 10 Version 1709Windows 10 Version 1909Windows 7 Service Pack 1Windows Server 2016Windows 10 Version 2004Windows 10 Version 1507Windows Server 2008 R2 Service Pack 1Windows 10 Version 1803Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012 R2Windows Server 2019Windows Server, version 1909 (Server Core installation)Windows Server 2012Windows Server 2008 Service Pack 2Windows Server 2012 R2 (Server Core installation)Windows Server, version 1903 (Server Core installation)Windows 10 Version 1709 for 32-bit Systems
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2026-21240
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 8.01%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 17:51
Updated-11 May, 2026 | 21:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows HTTP.sys Elevation of Privilege Vulnerability

Time-of-check time-of-use (toctou) race condition in Windows HTTP.sys allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_22h2windows_11_24h2windows_11_23h2windows_10_1809windows_server_2022windows_server_2025windows_11_25h2windows_server_2022_23h2windows_server_2019Windows 11 Version 26H1Windows 11 Version 24H2Windows Server 2019Windows 11 Version 25H2Windows 11 version 26H1Windows 10 Version 1809Windows Server 2019 (Server Core installation)Windows Server 2025Windows Server 2022Windows 11 version 22H3Windows 11 Version 23H2Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2025 (Server Core installation)Windows 10 Version 22H2Windows 10 Version 21H2
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2020-11298
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 5.44%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 06:20
Updated-04 Aug, 2024 | 11:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

While waiting for a response to a callback or listener request, non-secure clients can change permissions to shared memory buffers used by HLOS Invoke Call to secure kernel in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarewcn3991_firmwarewsa8830sd678sm6250p_firmwareqcs610qcs2290_firmwareqca8337qca6431_firmwaresd7c_firmwaremdm9628_firmwarewcd9360_firmwarecsra6620qcs4290wcn3950_firmwaresc8180x\+sdx55sd765g_firmwareqca6420_firmwareqca6595au_firmwareqcs2290qca6390_firmwaresd690_5gsd730_firmwarewcd9370csra6620_firmwareqcs605_firmwaresd_675_firmwaresd675_firmwarecsra6640_firmwareqcs6125_firmwareqca6426qca6584au_firmwarewcn3990_firmwareqca9984_firmwareqca9377sa415mwcn3998sd_8cx_firmwarewcd9371_firmwaresdxr2_5g_firmwarewcd9385_firmwaresm4125mdm9628sd720gmdm9206_firmwarewcd9326_firmwarewcn3950whs9410sd662sd710_firmwaresd460_firmwaresa8155qca6574au_firmwaresdx55_firmwareqca6595auwcd9375_firmwarewcn3998_firmwarewcn3999_firmwaresm7250p_firmwareqca6420qca6436_firmwarewcd9360qca6564au_firmwareqca6584ausa6155p_firmwareqca9367_firmwarewcd9306whs9410_firmwarewcn3999sa515m_firmwaresdxr2_5gqca9367qcs6125sa8155_firmwareqca4004_firmwaresd662_firmwaresa415m_firmwareqcs405qca6430wcn3988_firmwareqca6421sd712_firmwaresm6250wcd9306_firmwaresa8195psdm830_firmwarewcd9340wsa8810_firmwaresd765gsd765_firmwareqca6436wcd9326wcd9335sa6155pwcn6851qcs603_firmwareqcs4290_firmwarewcd9385wcd9341qca6431qca6696_firmwarewcd9371sd750gsd870_firmwarear8035qca6390sd_8cxaqt1000sd750g_firmwarewcd9375sc8180x\+sdx55_firmwaresm6250_firmwarewcn3910_firmwareqca4004wsa8830_firmwaresd855_firmwaresd865_5g_firmwaresd712sd888_5g_firmwarewcn3988wcn6850_firmwarewsa8815_firmwarewsa8835_firmwaresa8195p_firmwareqca6564awcn6750_firmwareqcm6125_firmwareqcm2290_firmwarewcn3991qca8337_firmwarewcd9380_firmwarewcn3990sd_675wcd9330sd865_5gqca6595qca6564ausdx24sdx55m_firmwaresd670_firmwarewsa8835sd665_firmwarewcd9380sd888_5gsm6250pqcs410qca6574asd690_5g_firmwaresdx50m_firmwaremdm9206sdx24_firmwareqca6430_firmwarewcd9335_firmwarewcn3980wcn6750mdm9205sa515mqcs605wcd9340_firmwaresd855sm4125_firmwarewcn6850sd665sd7cwcn3910wsa8815sd_8c_firmwaresd765qca6426_firmwareqca6574a_firmwareqca9984sd768g_firmwarewcn3980_firmwaresd460qca6391sd730sdx55msdxr1_firmwarewcd9330_firmwareqca6421_firmwareaqt1000_firmwaresd678_firmwarear8031_firmwareqcm4290sdx50msd480_firmwareqcs603wcn6851_firmwareqca6574ausa8155p_firmwaresd710sd670qca6564a_firmwarewcd9341_firmwareqcm6125qcm4290_firmwaresd480sd870wsa8810qcs610_firmwareqsm8250sd_8csdxr1sd768gar8031qca6595_firmwareqcs405_firmwareqca6696mdm9205_firmwareqca6391_firmwarewcd9370_firmwaresdx55sa8155pcsra6640sd675sm7250psdm830sd720g_firmwareqcs410_firmwarear8035_firmwareqcm2290qsm8250_firmwareSnapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2026-20831
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.67%
||
7 Day CHG+0.01%
Published-13 Jan, 2026 | 17:56
Updated-01 Apr, 2026 | 13:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

Time-of-check time-of-use (toctou) race condition in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016windows_10_21h2windows_10_22h2windows_server_2022_23h2windows_server_2025windows_10_1809windows_server_2022windows_11_24h2windows_10_1607windows_server_2019windows_server_2008windows_11_23h2windows_11_25h2windows_server_2012Windows Server 2012 (Server Core installation)Windows Server 2025Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2008 R2 Service Pack 1Windows 11 Version 24H2Windows Server 2008 Service Pack 2Windows 10 Version 21H2Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012 R2 (Server Core installation)Windows Server 2019 (Server Core installation)Windows 11 version 22H3Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2012 R2Windows 10 Version 22H2Windows Server 2022Windows Server 2012Windows 11 Version 25H2Windows Server 2025 (Server Core installation)Windows Server 2016Windows 10 Version 1607Windows 11 Version 23H2Windows Server 2016 (Server Core installation)Windows Server 2019Windows 10 Version 1809
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2026-20816
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 10.55%
||
7 Day CHG+0.01%
Published-13 Jan, 2026 | 17:56
Updated-01 Apr, 2026 | 13:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Installer Elevation of Privilege Vulnerability

Time-of-check time-of-use (toctou) race condition in Windows Installer allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016windows_10_21h2windows_10_22h2windows_server_2022_23h2windows_server_2025windows_10_1809windows_server_2022windows_11_24h2windows_10_1607windows_server_2019windows_server_2008windows_11_23h2windows_11_25h2windows_server_2012Windows Server 2012 (Server Core installation)Windows Server 2025Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2008 R2 Service Pack 1Windows 11 Version 24H2Windows Server 2008 Service Pack 2Windows 10 Version 21H2Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012 R2 (Server Core installation)Windows Server 2019 (Server Core installation)Windows 11 version 22H3Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2012 R2Windows 10 Version 22H2Windows Server 2022Windows Server 2012Windows 11 Version 25H2Windows Server 2025 (Server Core installation)Windows Server 2016Windows 10 Version 1607Windows 11 Version 23H2Windows Server 2016 (Server Core installation)Windows Server 2019Windows 10 Version 1809
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2026-20809
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 11.68%
||
7 Day CHG+0.01%
Published-13 Jan, 2026 | 17:56
Updated-01 Apr, 2026 | 13:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Kernel Memory Elevation of Privilege Vulnerability

Time-of-check time-of-use (toctou) race condition in Windows Kernel Memory allows an authorized attacker to elevate privileges locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016windows_10_21h2windows_10_22h2windows_server_2022_23h2windows_server_2025windows_10_1809windows_server_2022windows_11_24h2windows_10_1607windows_server_2019windows_11_23h2windows_11_25h2windows_server_2012Windows Server 2025Windows Server 2022, 23H2 Edition (Server Core installation)Windows 11 Version 24H2Windows 10 Version 21H2Windows Server 2012 R2 (Server Core installation)Windows Server 2019 (Server Core installation)Windows 11 version 22H3Windows Server 2012 R2Windows Server 2022Windows 10 Version 22H2Windows 11 Version 25H2Windows Server 2025 (Server Core installation)Windows Server 2016Windows 10 Version 1607Windows 11 Version 23H2Windows Server 2016 (Server Core installation)Windows Server 2019Windows 10 Version 1809
CWE ID-CWE-122
Heap-based Buffer Overflow
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-49046
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.24% / 47.79%
||
7 Day CHG~0.00%
Published-12 Nov, 2024 | 17:53
Updated-08 Jul, 2025 | 15:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability

Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1809windows_server_2016windows_server_2022_23h2windows_server_2012windows_server_2008windows_10_1507windows_11_24h2windows_server_2025windows_10_22h2windows_server_2022windows_11_22h2windows_server_2019windows_10_1607windows_11_23h2Windows Server 2022Windows 11 Version 24H2Windows Server 2019 (Server Core installation)Windows Server 2012 (Server Core installation)Windows 10 Version 1809Windows 10 Version 1507Windows 10 Version 1607Windows Server 2012 R2 (Server Core installation)Windows Server 2012Windows 10 Version 22H2Windows Server 2008 Service Pack 2 (Server Core installation)Windows 11 version 22H3Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows 10 Version 21H2Windows Server 2019Windows Server 2008 R2 Service Pack 1Windows Server 2012 R2Windows Server 2025 (Server Core installation)Windows Server 2025Windows Server 2008 Service Pack 2Windows 11 version 22H2Windows Server 2016Windows Server 2016 (Server Core installation)Windows 11 Version 23H2Windows Server 2008 Service Pack 2Windows Server 2022, 23H2 Edition (Server Core installation)
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-48394
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 11.27%
||
7 Day CHG~0.00%
Published-05 Feb, 2025 | 00:00
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Time-of-Check to Time-of-Use (TOCTOU) vulnerability has been identified in the driver of the NDD Print solution, which could allow an unprivileged user to exploit this flaw and gain SYSTEM-level access on the device. The vulnerability affects version 5.24.3 and before of the software.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-45560
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.09% / 24.70%
||
7 Day CHG~0.00%
Published-03 Feb, 2025 | 16:51
Updated-12 Feb, 2025 | 20:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Camera

Memory corruption while taking a snapshot with hardware encoder due to unvalidated userspace buffer.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800_firmwarewsa8840qcm6490_firmwaresdm429wsc8380xp_firmwareqcs5430wsa8845h_firmwareqca6420wcn3620_firmwarewsa8845qcm6490wcd9380_firmwareqca6391_firmwaresc8180x-ad_firmwareqca6391qcs5430_firmwarewcn3660bsdm429w_firmwareqca6430wsa8845_firmwarevideo_collaboration_vc3_platform_firmwareqcm5430wcd9370wcd9340_firmwaresc8180x-acafsnapdragon_429_mobile_firmwarewsa8835wsa8845haqt1000_firmwarefastconnect_7800wcd9341_firmwarewcd9340wcd9341sc8280xp-abbbsc8180x-aaab_firmwarefastconnect_6900qcm5430_firmwarefastconnect_6800snapdragon_7c\+_gen_3_computesnapdragon_429_mobilefastconnect_6700wcd9375_firmwaresnapdragon_7c\+_gen_3_compute_firmwarewsa8810_firmwarewcd9385_firmwarewsa8810fastconnect_6700_firmwaresc8180x-adwcd9375sc8280xp-abbb_firmwaresc8180x-aaabqca6420_firmwarewsa8815fastconnect_6200_firmwareqca6430_firmwarewcd9380video_collaboration_vc3_platformwsa8830wsa8815_firmwarefastconnect_6200wsa8830_firmwarewcn3620fastconnect_6900_firmwareqcs6490qcs6490_firmwaresc8180x-acaf_firmwaresc8380xpaqt1000fastconnect_6800_firmwarewcd9385wsa8840_firmwarewcn3660b_firmwarewsa8835_firmwarewcd9370_firmwareSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-45565
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 12.03%
||
7 Day CHG~0.00%
Published-06 May, 2025 | 08:31
Updated-26 Feb, 2026 | 18:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Camera Driver

Memory corruption when blob structure is modified by user-space after kernel verification.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_429_mobile_firmwarewcn3620_firmwaresdm429wwcn3620sdm429w_firmwarewcn3660b_firmwaresnapdragon_429_mobilewcn3660bSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-43067
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.08% / 23.20%
||
7 Day CHG+0.03%
Published-07 Apr, 2025 | 10:15
Updated-26 Feb, 2026 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Camera

Memory corruption occurs during the copying of read data from the EEPROM because the IO configuration is exposed as shared memory.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-sw5100pwsa8832_firmwaresa8195psnapdragon_xr2_5g_platformvideo_collaboration_vc1_platformwsa8810_firmwarewsa8835sxr2130qcs610_firmwareqam8295pqca6696fastconnect_7800sdx55_firmwarewcn3660bqca6391wsa8830sa8155pwsa8832sw5100sa8155p_firmwarefastconnect_6800sa6150p_firmwarewcn3988_firmwaresnapdragon_865_5g_mobile_platform_firmwareqca6426_firmwarevideo_collaboration_vc1_platform_firmwarewsa8835_firmwaresnapdragon_x55_5g_modem-rf_system_firmwaresa8295p_firmwaresd865_5g_firmwarewcn3660b_firmwaresa6155p_firmwaresa6145pqcs410_firmwarewcd9385qca6696_firmwaresa8530pwcd9385_firmwarewcn3680b_firmwaresnapdragon_xr2_5g_platform_firmwarevideo_collaboration_vc3_platform_firmwarec-v2x_9150_firmwaresxr2250pwcn3680bsdm429wqca6426sa8145pqcs610wcn3950_firmwaresa6150pqca6436sxr2230p_firmwaresa8530p_firmwarewcd9370_firmwaresxr2250p_firmwaresnapdragon_865_5g_mobile_platformwcd9370qca6574au_firmwarewsa8815sdm429w_firmwaresa8295pwcd9341qsm8250_firmwaresa6145p_firmwarewsa8810qca6436_firmwaresnapdragon_870_5g_mobile_platform_\(sm8250-ac\)snapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)_firmwarewcd9380sxr2130_firmwarec-v2x_9150fastconnect_6800_firmwarewsa8815_firmwarefastconnect_6900_firmwaresnapdragon_8_gen_1_mobile_platform_firmwaresw5100p_firmwareqca6391_firmwaresa8540p_firmwaresnapdragon_429_mobile_platform_firmwaresa8150p_firmwareqcn9074video_collaboration_vc3_platformsw5100_firmwarewcn3980_firmwaresd865_5gsnapdragon_870_5g_mobile_platform_\(sm8250-ac\)_firmwareqam8295p_firmwarefastconnect_7800_firmwaresnapdragon_429_mobile_platformsnapdragon_w5\+_gen_1_wearable_platform_firmwarewcn3620snapdragon_w5\+_gen_1_wearable_platformwcn3980sa8145p_firmwareqca6574auwcn3988snapdragon_8_gen_1_mobile_platformqcn9074_firmwaresa8150pfastconnect_6900wcn3620_firmwareqsm8250snapdragon_865\+_5g_mobile_platform_\(sm8250-ab\)sa9000psxr2230psdx55wcd9341_firmwaresa9000p_firmwaresa8195p_firmwaresa6155psnapdragon_x55_5g_modem-rf_systemwcn3950wcd9380_firmwareqcs410wsa8830_firmwaresa8540pSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-33154
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-1.16% / 78.75%
||
7 Day CHG~0.00%
Published-11 Jul, 2023 | 17:03
Updated-01 Jan, 2025 | 01:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Partition Management Driver Elevation of Privilege Vulnerability

Windows Partition Management Driver Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1809windows_server_2016windows_server_2012windows_server_2008windows_10_1507windows_11_21h2windows_10_22h2windows_server_2022windows_11_22h2windows_server_2019windows_10_1607Windows Server 2022Windows 10 Version 1607Windows 11 version 22H2Windows Server 2019 (Server Core installation)Windows Server 2008 Service Pack 2Windows 10 Version 1809Windows Server 2016 (Server Core installation)Windows 11 version 21H2Windows Server 2012 (Server Core installation)Windows Server 2016Windows 10 Version 1507Windows 10 Version 21H2Windows Server 2008 R2 Service Pack 1Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012 R2Windows Server 2019Windows Server 2012Windows Server 2008 Service Pack 2Windows Server 2012 R2 (Server Core installation)Windows 10 Version 22H2
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-33046
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.02% / 4.76%
||
7 Day CHG~0.00%
Published-06 Feb, 2024 | 05:46
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Trusted Execution Environment

Memory corruption in Trusted Execution Environment while deinitializing an object used for license validation.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qcm8550_firmwarewsa8845_firmwarewsa8832wsa8840qam8295p_firmwareqca6595qcs8550_firmwareqca8081_firmwarear8035_firmwareqca6696qrb5165mqca6698aq_firmwarewcd9385qcn9012wcd9395_firmwareqcn6024snapdragon_8_gen_2_mobile_platformqcs7230_firmwaresxr1230p_firmwarewcd9390_firmwaresg8275pwsa8832_firmwareqca8337_firmwaresnapdragon_x70_modem-rf_system_firmwareqca8337wcd9395ssg2125psg8275p_firmwareqca6574au_firmwaresnapdragon_8cx_gen_3_compute_platform_firmwareqam8295pqcs8250_firmwareqca6574auwcd9390sa8540p_firmwareflight_rb5_5g_platformvideo_collaboration_vc5_platformwsa8845h_firmwaresm8550p_firmwareqcm8550sa9000p_firmwaresnapdragon_x65_5g_modem-rf_systemqcn9024snapdragon_x65_5g_modem-rf_system_firmwareqrb5165n_firmwarewsa8835wsa8840_firmwaresxr2230p_firmwareqca6391_firmwareqcn9011snapdragon_ar2_gen_1_platformsa8295p_firmwareqca6696_firmwareqcn9024_firmwaresnapdragon_8cx_gen_3_compute_platformqcn6024_firmwarewsa8845hwcd9380_firmwareqca8081wsa8830sm8550pssg2115pqcn9011_firmwareflight_rb5_5g_platform_firmwarear8035sa8540pqrb5165m_firmwareqca6595_firmwareqcs7230fastconnect_6900fastconnect_7800_firmwarerobotics_rb5_platformqca6391snapdragon_x70_modem-rf_systemqcn9012_firmwareqca6698aqssg2125p_firmwarewcd9385_firmwareqrb5165nfastconnect_6900_firmwaresa8295psnapdragon_8_gen_2_mobile_platform_firmwarerobotics_rb5_platform_firmwarewcd9380qcs8550sxr2230pfastconnect_7800snapdragon_ar2_gen_1_platform_firmwaresnapdragon_8\+_gen_2_mobile_platform_firmwarewsa8845wsa8835_firmwaresxr1230pssg2115p_firmwarevideo_collaboration_vc5_platform_firmwareqcs8250sa9000psnapdragon_8\+_gen_2_mobile_platformwsa8830_firmwareSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CWE ID-CWE-787
Out-of-bounds Write
CVE-2023-22883
Matching Score-4
Assigner-Zoom Video Communications, Inc.
ShareView Details
Matching Score-4
Assigner-Zoom Video Communications, Inc.
CVSS Score-7.2||HIGH
EPSS-0.10% / 27.96%
||
7 Day CHG~0.00%
Published-16 Mar, 2023 | 00:00
Updated-26 Feb, 2025 | 20:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local Privilege Escalation in Zoom for Windows Installers

Zoom Client for IT Admin Windows installers before version 5.13.5 contain a local privilege escalation vulnerability. A local low-privileged user could exploit this vulnerability in an attack chain during the installation process to escalate their privileges to the SYSTEM user.

Action-Not Available
Vendor-Zoom Communications, Inc.
Product-meetingsZoom Client for Meetings for IT Admin Windows installers
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-21537
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.42% / 62.04%
||
7 Day CHG~0.00%
Published-10 Jan, 2023 | 00:00
Updated-01 Jan, 2025 | 00:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability

Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1809windows_server_2016windows_server_2012windows_server_2008windows_8.1windows_rt_8.1windows_11_21h2windows_7windows_10_22h2windows_server_2022windows_10_20h2windows_11_22h2windows_server_2019windows_10_1607Windows Server 2022Windows 10 Version 1607Windows 11 version 22H2Windows Server 2019 (Server Core installation)Windows Server 2008 Service Pack 2Windows 10 Version 1809Windows Server 2016 (Server Core installation)Windows 11 version 21H2Windows 8.1Windows 7Windows Server 2012 (Server Core installation)Windows 7 Service Pack 1Windows 10 Version 20H2Windows Server 2016Windows 10 Version 1507Windows 10 Version 21H2Windows Server 2008 R2 Service Pack 1Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2012 R2Windows Server 2019Windows Server 2012Windows Server 2008 Service Pack 2Windows Server 2012 R2 (Server Core installation)Windows 10 Version 22H2
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2023-2007
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-0.04% / 10.65%
||
7 Day CHG+0.01%
Published-24 Apr, 2023 | 00:00
Updated-02 Aug, 2024 | 06:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The specific flaw exists within the DPT I2O Controller driver. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the kernel.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncNetApp, Inc.Debian GNU/Linux
Product-debian_linuxlinux_kernelh500sh410s_firmwaresolidfire_\&_hci_management_nodeh700s_firmwareh300s_firmwareh500s_firmwareh410c_firmwareh410sh410ch300sh700sLinux kernel's DPT I2O Controller driver
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CWE ID-CWE-667
Improper Locking
CVE-2025-55236
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.3||HIGH
EPSS-0.10% / 26.55%
||
7 Day CHG~0.00%
Published-09 Sep, 2025 | 17:01
Updated-20 Feb, 2026 | 16:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Graphics Kernel Remote Code Execution Vulnerability

Time-of-check time-of-use (toctou) race condition in Graphics Kernel allows an authorized attacker to execute code locally.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_11_22h2windows_server_2022windows_server_2022_23h2windows_10_22h2windows_11_24h2windows_server_2019windows_10_1809windows_10_21h2windows_11_23h2windows_server_2025Windows Server 2025Windows Server 2022Windows 11 Version 24H2Windows Server 2025 (Server Core installation)Windows 11 Version 23H2Windows Server 2019 (Server Core installation)Windows 10 Version 1809Windows 11 version 22H2Windows 10 Version 21H2Windows Server 2022, 23H2 Edition (Server Core installation)Windows 11 version 22H3Windows 10 Version 22H2Windows Server 2019
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CWE ID-CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')
CVE-2024-38418
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.10% / 27.00%
||
7 Day CHG~0.00%
Published-03 Feb, 2025 | 16:51
Updated-05 Feb, 2025 | 13:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Camera Linux

Memory corruption while parsing the memory map info in IOCTL calls.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-fastconnect_7800_firmwareqca6426sdm429wqca6696sd865_5gcsrb31024qcs610sa8155p_firmwareqam8295p_firmwaresd865_5g_firmwarec-v2x_9150_firmwaresa8195p_firmwaresa8145p_firmwareqcn9074_firmwarewcn3620_firmwarevideo_collaboration_vc1_platform_firmwarewcn3680bwcd9380_firmwaresnapdragon_auto_4g_modemqca6574au_firmwareqsm8250_firmwareqca6391_firmwaresa8195psnapdragon_auto_4g_modem_firmwarewcn3950_firmwareqca6391wcn3660bsdm429w_firmwarec-v2x_9150wcn3980wcn3950video_collaboration_vc3_platform_firmwaresnapdragon_w5\+_gen_1_wearablesw5100sxr2230pwcd9370sa8540p_firmwaresnapdragon_x55_5g_modem-rfsw5100p_firmwaresa8295p_firmwaresnapdragon_865\+_5g_mobilesa8150p_firmwaresxr2230p_firmwaresnapdragon_429_mobile_firmwarewsa8835sa9000psxr2130csrb31024_firmwareqsm8250qca6426_firmwareqcn9074fastconnect_7800sa6155p_firmwarewcd9341_firmwaresnapdragon_8_gen_1_mobileqca6564au_firmwaresnapdragon_870_5g_mobilesnapdragon_865_5g_mobile_firmwareqam8295psnapdragon_xr2_5g_firmwarewcd9341wcn3988snapdragon_x55_5g_modem-rf_firmwaresnapdragon_865_5g_mobileqca6574ausa8150psa6150p_firmwarefastconnect_6900snapdragon_xr2_5gwcn3988_firmwaresw5100_firmwaresxr2250pfastconnect_6800snapdragon_429_mobileqcs410_firmwaresa8530p_firmwareqca6696_firmwaresnapdragon_8_gen_1_mobile_firmwarewsa8810_firmwarewcd9385_firmwaresa6150pwcn3680b_firmwarewsa8810wsa8832sa8295psa6145p_firmwareqcs610_firmwaresa6145psnapdragon_870_5g_mobile_firmwarewsa8815snapdragon_w5\+_gen_1_wearable_firmwareqcs410sdx55sdx55_firmwaresa6155psnapdragon_865\+_5g_mobile_firmwarewcd9380video_collaboration_vc3_platformwsa8830qca6436_firmwarewsa8815_firmwaresa8155pwsa8832_firmwaresa8145psw5100psa8530pwsa8830_firmwarewcn3620wcn3980_firmwareqca6564ausxr2130_firmwarevideo_collaboration_vc1_platformqca6436fastconnect_6900_firmwaresa8540pqca6595au_firmwaresa9000p_firmwarefastconnect_6800_firmwarewcd9385qca6595auwcn3660b_firmwarewsa8835_firmwaresxr2250p_firmwarewcd9370_firmwareSnapdragon
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-38186
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.22% / 45.06%
||
7 Day CHG~0.00%
Published-13 Aug, 2024 | 17:30
Updated-10 Jul, 2025 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability

Windows Kernel-Mode Driver Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1809windows_server_2016windows_server_2022_23h2windows_11_21h2windows_10_22h2windows_server_2022windows_11_22h2windows_server_2019windows_10_1607windows_11_23h2Windows 11 version 22H3Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2016Windows Server 2022Windows Server 2016 (Server Core installation)Windows 11 version 22H2Windows 11 Version 23H2Windows Server 2019 (Server Core installation)Windows 11 version 21H2Windows 10 Version 22H2Windows 10 Version 1809Windows Server 2019Windows 10 Version 1607Windows 10 Version 21H2
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
CVE-2024-38406
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-7.8||HIGH
EPSS-0.16% / 36.45%
||
7 Day CHG~0.00%
Published-04 Nov, 2024 | 10:04
Updated-16 Nov, 2024 | 04:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Time-of-check Time-of-use (TOCTOU) Race Condition in Camera

Memory corruption while handling IOCTL calls in JPEG Encoder driver.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-wsa8830wcd9380_firmwaresnapdragon_8c_compute_platform_\(sc8180x-ad\)_\"poipu_lite\"sdm429wsnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\,_ab\)_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-aa\,_ab\)snapdragon_7c_gen_2_compute_platform_\(sc7180-ad\)_\"rennell_pro\"_firmwarefastconnect_6800snapdragon_8cx_compute_platform_\(sc8180xp-ac\,_af\)_\"poipu_pro\"wsa8840wsa8835sdm429w_firmwaresnapdragon_7c\+_gen_3_computesc8180x\+sdx55wcd9380qca6420_firmwarefastconnect_6700video_collaboration_vc3_platformwcd9370snapdragon_8c_compute_platform_\(sc8180xp-ad\)_\"poipu_lite\"qcm5430_firmwarevideo_collaboration_vc3_platform_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\,_af\)_\"poipu_pro\"_firmwareqca6430_firmwaresnapdragon_8cx_compute_platform_\(sc8180x-aa\,_ab\)_firmwarewcd9385_firmwarewsa8845snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\,_bb\)fastconnect_6200wcd9340_firmwarewcn3660bwsa8815wsa8845_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180x-ac\,_af\)_\"poipu_pro\"wcn3660b_firmwaresnapdragon_429_mobile_platform_firmwaresc8380xpfastconnect_6200_firmwarewsa8845h_firmwarewcd9375_firmwareqca6391qca6420snapdragon_429_mobile_platformfastconnect_7800snapdragon_7c_compute_platform_firmwareaqt1000_firmwareqcs6490qcm6490_firmwarewsa8840_firmwaresnapdragon_8cx_gen_2_5g_compute_platform_\(sc8180xp-aa\,_ab\)fastconnect_6900fastconnect_6900_firmwaresc8380xp_firmwaresnapdragon_8cx_compute_platform_\(sc8180xp-ac\,_af\)_\"poipu_pro\"_firmwareqca6430sm6250wcd9340fastconnect_6700_firmwarewsa8810_firmwarewcd9341_firmwarefastconnect_7800_firmwarewsa8810wsa8845hqcm5430qcs5430wcd9385wcd9341snapdragon_8c_compute_platform_\(sc8180x-ad\)_\"poipu_lite\"_firmwaresnapdragon_7c_gen_2_compute_platform_\(sc7180-ad\)_\"rennell_pro\"qcs6490_firmwareqcs5430_firmwareqca6391_firmwarewcd9375wcd9370_firmwareaqt1000snapdragon_8c_compute_platform_\(sc8180xp-ad\)_\"poipu_lite\"_firmwaresm6250_firmwaresc8180x\+sdx55_firmwarewsa8830_firmwarewcn3620_firmwaresnapdragon_7c\+_gen_3_compute_firmwarewsa8815_firmwareqcm6490wsa8835_firmwarewcn3620snapdragon_8cx_gen_3_compute_platform_\(sc8280xp-ab\,_bb\)_firmwarefastconnect_6800_firmwaresnapdragon_7c_compute_platformSnapdragonaqt1000_firmwarewcd9380_firmwareqcm6490_firmwarewsa8840_firmwarefastconnect_6900_firmwaresc8380xp_firmwaresdm429w_firmwarefastconnect_6700_firmwarewsa8810_firmwarewcd9341_firmwarefastconnect_7800_firmwareqca6420_firmwareqcm5430_firmwareqca6430_firmwareqcs6490_firmwareqcs5430_firmwarequalcomm_video_collaboration_vc3_platform_firmwareqca6391_firmwarewcd9385_firmwarewcd9370_firmwarewcd9340_firmwaresm6250_firmwarewsa8830_firmwarewsa8845_firmwarewcn3620_firmwarewsa8815_firmwarewcn3660b_firmwarewsa8835_firmwaresnapdragon_429_mobile_platform_firmwarefastconnect_6200_firmwarewcd9375_firmwarewsa8845h_firmwarefastconnect_6800_firmware
CWE ID-CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
  • Previous
  • 1
  • 2
  • Next
Details not found