9.8
CVE-2026-41089
- EPSS 0.1%
- Veröffentlicht 12.05.2026 16:58:50
- Zuletzt bearbeitet 15.05.2026 15:42:17
- Quelle secure@microsoft.com
- CVE-Watchlists
- Unerledigt
Windows Netlogon Remote Code Execution Vulnerability
Stack-based buffer overflow in Windows Netlogon allows an unauthorized attacker to execute code over a network.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Microsoft ≫ Windows Server 2012 Version-
Microsoft ≫ Windows Server 2012 Versionr2
Microsoft ≫ Windows Server 2016 Version < 10.0.14393.9140
Microsoft ≫ Windows Server 2019 Version < 10.0.17763.8755
Microsoft ≫ Windows Server 2022 Version < 10.0.20348.5074
Microsoft ≫ Windows Server 2022 23h2 Version < 10.0.25398.2330
Microsoft ≫ Windows Server 2025 Version < 10.0.26100.32772
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.1% | 0.279 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| secure@microsoft.com | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-121 Stack-based Buffer Overflow
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).