CVE-2026-41089 - Vulnerability Analysis
CriticalCVSS: 9.8Last Updated: May 12, 2026
Windows Netlogon - Remote Code Execution
Overview
Windows Netlogon contains a stack-based buffer overflow caused by improper input handling, letting unauthorized attackers execute code remotely over the network, exploit requires network access.
Severity & Score
Impact
Unauthorized attackers can execute arbitrary code remotely, potentially leading to full system compromise.
Mitigation
Update to the latest available version.
Social Media Activity(2 posts)
checks notes ... Windows Netlogon Remote Code Execution Windows DNS Client Remote Code Execution https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41096 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41089
View original postchecks notes ... Windows Netlogon Remote Code Execution Windows DNS Client Remote Code Execution https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41096 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41089
View original postRelated Resources
Details
- CVE ID
- CVE-2026-41089
- Severity
- Critical
- CVSS Score
- 9.8
- Type
- buffer_overflow
- Status
- new
- EPSS
- 0.0%
- Social Posts
- 2
CWE
- CWE-121
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H