LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-41089

CVE-2026-41089 - Vulnerability Analysis

CriticalCVSS: 9.8

Last Updated: May 12, 2026

Windows Netlogon - Remote Code Execution

Published: May 12, 2026Updated: May 12, 2026Remote Exploitable

Overview

Windows Netlogon contains a stack-based buffer overflow caused by improper input handling, letting unauthorized attackers execute code remotely over the network, exploit requires network access.

Severity & Score

Severity: Critical
CVSS Score: 9.8
EPSS Score: 0.0%(Probability of exploitation in next 30 days)

Impact

Unauthorized attackers can execute arbitrary code remotely, potentially leading to full system compromise.

Mitigation

Update to the latest available version.

Social Media Activity(2 posts)

nyanbinary
nyanbinary
@nyanbinary
May 12, 2026

checks notes ... Windows Netlogon Remote Code Execution Windows DNS Client Remote Code Execution https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41096 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41089

View original post
nyanbinary
nyanbinary
@nyanbinary
May 12, 2026

checks notes ... Windows Netlogon Remote Code Execution Windows DNS Client Remote Code Execution https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41096 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41089

View original post

Details

CVE ID
CVE-2026-41089
Severity
Critical
CVSS Score
9.8
Type
buffer_overflow
Status
new
EPSS
0.0%
Social Posts
2

CWE

  • CWE-121

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS Score

0.0%Probability of exploitation in the next 30 days