9.8
CVE-2026-41096
- EPSS 0.08%
- Veröffentlicht 12.05.2026 16:58:52
- Zuletzt bearbeitet 15.05.2026 15:38:39
- Quelle secure@microsoft.com
- CVE-Watchlists
- Unerledigt
Windows DNS Client Remote Code Execution Vulnerability
Heap-based buffer overflow in Microsoft Windows DNS allows an unauthorized attacker to execute code over a network.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Microsoft ≫ Windows 11 23h2 HwPlatformarm64 Version < 10.0.22631.7079
Microsoft ≫ Windows 11 23h2 HwPlatformx64 Version < 10.0.22631.7079
Microsoft ≫ Windows 11 24h2 HwPlatformarm64 Version < 10.0.26100.8390
Microsoft ≫ Windows 11 24h2 HwPlatformx64 Version < 10.0.26100.8390
Microsoft ≫ Windows 11 25h2 HwPlatformarm64 Version < 10.0.26200.8390
Microsoft ≫ Windows 11 25h2 HwPlatformx64 Version < 10.0.26200.8390
Microsoft ≫ Windows 11 26h1 HwPlatformarm64 Version < 10.0.28000.2113
Microsoft ≫ Windows 11 26h1 HwPlatformx64 Version < 10.0.28000.2113
Microsoft ≫ Windows Server 2022 23h2 Version < 10.0.25398.2330
Microsoft ≫ Windows Server 2025 Version < 10.0.26100.32772
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.08% | 0.229 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| secure@microsoft.com | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-122 Heap-based Buffer Overflow
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().