LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-41096

CVE-2026-41096 - Vulnerability Analysis

CriticalCVSS: 9.8

Last Updated: May 12, 2026

Microsoft Windows DNS - Remote Code Execution

Published: May 12, 2026Updated: May 12, 2026Remote Exploitable

Overview

Microsoft Windows DNS contains a heap-based buffer overflow caused by improper memory handling, letting unauthorized attackers execute code remotely, exploit requires network access.

Severity & Score

Severity: Critical
CVSS Score: 9.8
EPSS Score: 0.0%(Probability of exploitation in next 30 days)

Impact

Unauthorized attackers can execute arbitrary code remotely, potentially leading to full system compromise.

Mitigation

Update to the latest version of Microsoft Windows DNS.

Social Media Activity(2 posts)

nyanbinary
nyanbinary
@nyanbinary
May 12, 2026

checks notes ... Windows Netlogon Remote Code Execution Windows DNS Client Remote Code Execution https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41096 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41089

View original post
nyanbinary
nyanbinary
@nyanbinary
May 12, 2026

checks notes ... Windows Netlogon Remote Code Execution Windows DNS Client Remote Code Execution https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41096 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41089

View original post

Details

CVE ID
CVE-2026-41096
Severity
Critical
CVSS Score
9.8
Type
buffer_overflow
Status
new
EPSS
0.0%
Social Posts
2

CWE

  • CWE-122

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS Score

0.0%Probability of exploitation in the next 30 days